Information Security Implementation Methodologies

نویسنده

  • Lizette Robbertze
چکیده

Information used by organisations is a valuable asset and has to be protected from the loss of integrity, confidentiality and availability. Information protection can be achieved through effective management, with meaningful board oversight. In an attempt to identify a generic methodology for the implementation of an information security management system, existing methodologies were investigated. This investigation highlighted the different aspects that would form an essential part of such a generic methodology. 2 L.ROBBERTZE, J.H.P. ELOFF

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

Comparing Different Methodologies Used To Ensure the Security of RFID Credit Card: A Comparative Analysis

The use of Radio Frequency Identification (RFID) advancement is turning out to be rapidly transversely over an extensive variety of business undertakings. Engineers apply the development not simply in customary applications, for instance, asset or stock after, also in security organizations, electronic travel papers and RFID-embedded card. In any case, RFID development moreover brings different...

متن کامل

A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization

The promotion of Information Security Governance (ISG) has become an important factor in the implementation of e-government and information security management within the “National Information and Communications Technology Security Development Program (2009 ̃2012)” in continuing the “Plan for Establishment of Information and Communication Technology Infrastructure Security Mechanism (2001 ̃2008)”...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

Integrating Security into Information Systems Development : A Socio - Technical

This paper provides a framework to reconcile the apparent duality between Information Systems Development and Information Systems Security Development. Though there is a substantial foundation of literature on approaches and methodologies for Information Systems Development as well as for Information systems Security Development, the two are not well integrated. Part of the cause of the continu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2002