Information security analysis on physical security in university x using maturity model
نویسندگان
چکیده
منابع مشابه
A cyclical evaluation model of information security maturity
! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement ...
متن کاملIsfam: the Information Security Focus Area Maturity Model
Information security is mainly a topic that is considered to be information technology related. However, to successfully implement information security, an organization’s information security program should reflect the business strategy. Nowadays information security is in many companies enforced by the information technology department, based on what they think should be in place to protect th...
متن کاملSecurity Vigilance System through Level Driven Security Maturity Model
Success of any software system largely looms upon its vigilance efficiency that prompts organizations to meet the set of objectives in the arena of networks. In the highly competitive world, everything appears to be vulnerable; information system is also not an exception to this fact. The security of information system has become a cause of great concern. On the contrary, till time the software...
متن کاملInvestigating the Physical Security Dimensions Affecting Volleyball Stadiums Security
The present study aimed at investigating the physical security dimensions affecting the security of volleyball stadiums in Iran. The study employed a descriptive-exploratory research method conducted on 115 managers and officials in volleyball stadiums, presidents and experts of Provincial Volleyball Boards as well as experts in the field of sports facilities and events as wel...
متن کاملUsing a Capability Maturity Model to Derive Security Requirements
A security engineer is often assigned to a project that already has defined security objectives. But on occasion, the security engineer may be tasked with the initial definition of the objectives. While this assignment may be exciting because of the important role the security engineer is to play, it may also be somewhat daunting due to the large solution space. In order to guide one’s efforts ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Jurnal Informatika
سال: 2020
ISSN: 2528-6374,1978-0524
DOI: 10.26555/jifo.v14i2.a14434