Information Security Implementation Methodologies
نویسنده
چکیده
Information used by organisations is a valuable asset and has to be protected from the loss of integrity, confidentiality and availability. Information protection can be achieved through effective management, with meaningful board oversight. In an attempt to identify a generic methodology for the implementation of an information security management system, existing methodologies were investigated. This investigation highlighted the different aspects that would form an essential part of such a generic methodology. 2 L.ROBBERTZE, J.H.P. ELOFF
منابع مشابه
Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملComparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis
The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...
متن کاملA Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization
The promotion of Information Security Governance (ISG) has become an important factor in the implementation of e-government and information security management within the “National Information and Communications Technology Security Development Program (2009 ̃2012)” in continuing the “Plan for Establishment of Information and Communication Technology Infrastructure Security Mechanism (2001 ̃2008)”...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملIntegrating Security into Information Systems Development : A Socio - Technical
This paper provides a framework to reconcile the apparent duality between Information Systems Development and Information Systems Security Development. Though there is a substantial foundation of literature on approaches and methodologies for Information Systems Development as well as for Information systems Security Development, the two are not well integrated. Part of the cause of the continu...
متن کامل