Security Management Life Cycle (SMLC): A Comparative Study

نویسندگان

  • Joobin Choobineh
  • Evan E. Anderson
  • Michael R. Grimaila
چکیده

We introduce an integrated conceptualization of enterprise information technology security management in the form of a life cycle that accounts for the people, processes, infrastructure, and applications within an enterprise. Our life cycle view provides a lens through which one can view the security management activities at the strategic, tactical, and operational levels with regard to their strategic alignment with organizational goals. We compare and contrast three widely adopted frameworks (COSO, COBIT and ITIL) for enterprise risk and IT management with respect to our life cycle. We conclude that although the definitions of each stage of the life cycle are similar in these frameworks, their approach, philosophy, and method of execution is primarily determined by their unique focus. By developing a life cycle abstraction which encapsulates all of these frameworks, security management can better understand how their responsibilities and activities support organizational objectives.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Effect of Firm Life Cycle Theory on the relevance of Risk Measures

Risk phenomenon is one of the key characteristics of decision making in the fields of investment, issues associated with financial markets, and various economic activities. The present study was an attempt to evaluate the impact of different periods of life cycle of companies on the relevance of risk measures of companies. In this study, the collected data have been analyzed in three stages. Fi...

متن کامل

Mapping of McGraw Cycle to RUP Methodology for Secure Software Developing

Designing a secure software is one of the major phases in developing a robust software. The McGraw life cycle, as one of the well-known software security development approaches, implements different touch points as a collection of software security practices. Each touch point includes explicit instructions for applying security in terms of design, coding, measurement, and maintenance of softwar...

متن کامل

Comparative Advantage, Self-sufficiency and Food Security in Iran: Case Study of Wheat Commodity

Food security has a dynamic notion during the time and may be affected by various domestic and global factors.Nevertheless, Iranian policy makers consider food security as same as self-sufficiency in agricultural food products, particularly wheat production. However, self-sufficiency can contribute to food security only if it is in coincidences with comparative advantage and sustainable resourc...

متن کامل

A Comparative Analysis on Sony’s Approach to Problem Solving and Decision-Making

Decision making and problem solving are especially important skills for business and life. As an innovation leading corporate, Sony has gradually lost their superiority in innovation and core competences under more and more intensive competition environment. This report is made to investigate Sony current procedure on its solving problems and making decision, analyze approaches and tools used b...

متن کامل

A COMPARATIVE MODEL OF EVM AND PROJECT’S SCHEDULE RISK ANALYSIS USING MONTE CARLO SIMULATION

<span style="color: #000000; font-family: Tahoma, sans-serif; font-size: 13px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: auto; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: 0px; display: inline !important; float: none; backgro...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010