Threats, Risks and the Derived Information Security Strategy
نویسندگان
چکیده
1ms article concentrates on the development of an infonnation security strategy. An information security strategy needs to focus on an overall objective. usually the objectives laid out in an organization's business strategy and its derived information technology strategy. where it takes the status quo and reflects the main objectives derived and postulates how and when to close the identified gaps. This strategy approach for improving information security is intended for an organization which supports an automotive and captive finance enterprise but is not restricted to this. The approach is aligned to the scope afISa 270002 "Code of Practice for an Information Security Management System" [lS005]. However. compliance is left out of the scope. The strategy concentrates on four areas considered the relevant areas for infonnation security: people, business processses. applications and infrastructure and has therefore a clear focus on processes, stability, resilience and efficiency which are the pillars of a successful enterprise.
منابع مشابه
Users as the Biggest Threats to Security of Health Information Systems
There are a lot of researches in the world about attacks on information systems (IS). Although there have been many attempts to classify threats of IS’s especially in Health Information Systems (HIS), it is still necessary for all health organization to identify new threats and their sources which threaten security of health care domain. The main aim of this paper is to present a research agend...
متن کاملIdentifying Information Security Risk Components in Military Hospitals in Iran
Background and Aim: Information systems are always at risk of information theft, information change, and interruptions in service delivery. Therefore, the present study was conducted to develop a model for identifying information security risk in military hospitals in Iran. Methods: This study was a qualitative content analysis conducted in military hospitals in Iran in 2019. The sample consist...
متن کاملA risk model for cloud processes
Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more stakeholders. Assessing risks of cloud-based processes is particularly difficult due to lack of historical data on attacks, which has prevented frequency-based identification...
متن کاملA Review and Analysis of the United States' Aggressive Intentions and Security Threats following the Islamic Revolution of Iran
Having reviewed and evaluated the aggressive intentions security threats in United States' behavior against the Islamic Republic of Iran, this article puts the greatest emphasis on aggressive intention especially "national security doctrine" and mentioning some of its characteristics so by categorizing different approaches toward national security clarify some of vague aspects of this concept. ...
متن کاملRisk of Insider Threats in Information Systems Outsourcing:
The risks involved in Information Technology Outsourcing has since long been known to affect business decisions of whether to outsource or not. This has lead to numerous research on topics such as: Understanding and Managing Outsourcing Risks, Methodologies to measure Outsourcing Risks, Risk Factors in Information Technology Outsourcing, Assessing the Risk of IT Outsourcing to name a few. But v...
متن کامل