An assessment of Information Security Policies within the Polokwane area: A case study

نویسندگان

  • S. A. Mlangeni
  • E. Biermann
چکیده

Information needs to be transmitted to and from the organisation, and thus may be vulnerable within certain stages along the communications line. If at any stage of the process, the information is compromised, it could have a negative impact on the entire organisation. Protective measures such as disaster recover plans, encryption / decryption, and information systems controls, can minimize or prevent the negative consequences. It is vital therefore that management of information systems take measures to protect their critical data and information from loss, damage, and misuse.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

Information Security Policy Development and Implementation Piggybacking onto Finnish National Security Auditing Criteria KATAKRI

The “weakest link” of security is the human and organizational aspects of information security. Nowadays, risk assessment methods and information security plans and policies are an essential part of many organizations. However, the managerial aspects of information security often remain challenging, especially in emerging technological contexts, and management executives lack an understanding o...

متن کامل

A semantic-aware role-based access control model for pervasive computing environments

Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...

متن کامل

An Integrated Baseline Geodatabase for Facilitating the Environmental Impact Assessment Process: Case Study of Sabalan Geothermal Project, Iran

Baseline data represent one of the important stages of Environmental Impact Assessment (EIA) procedure that describes the existing environment of the study area and surrounding areas in enough detail to allow the environmental impacts of the proposed area to be accurately and adequately assessed, and future changes and effects can be measured. Baseline data may be inaccurate, difficult to obtai...

متن کامل

Feasibility study on ecotourism potential areas using remote sensing and geographic information system (case study: abbasabad forest area, veresk, iran)

Ecotourism as the most attractive subset of the tourism industry can contribute to natural resource conservation and local development. Although great numbers of people annually visit Abbasabad area, in Veresk, Mazandaran, to enjoy its brilliant landscape and moderate ecologic condition, there is no applicable plan for many natural attractive zones in this area. As a result, some specific well ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2005