The Effective Implementation of Information Security in Organizations

作者: Oliver André Hoppe , Johan van Niekerk , Rossouw von Solms

DOI: 10.1007/978-0-387-35586-3_1

关键词: Process managementCertified Information Security ManagerSecurity information and event managementComputer scienceInformation securitySecurity convergenceInformation security managementInformation security standardsAsset (computer security)Computer securityITIL security management

摘要: Due to the overwhelming complexity in establishing and maintaining a secure organizational framework, it is essential that various Information Security Management elements be tightly integrated form well planned methodology. However, organizations often do not have necessary expertise or resources follow such detailed This paper introduces software tool can automate phases comprising Methodology.

参考文章(6)
Donn B. Parker, Fighting computer crime: a new framework for protecting information John Wiley & Sons, Inc.. ,(1998)
Barry Moule, Lina Giavara, Policies, procedures and standards: an approach for implementation Information Management & Computer Security. ,vol. 3, pp. 7- 16 ,(1995) , 10.1108/09685229510092057
Karen A. Forcht, Computer Security Management ,(1993)
Rossouw von Solms, Information security management (3): the Code of Practice for Information Security Management (BS 7799) Information Management & Computer Security. ,vol. 6, pp. 224- 225 ,(1998) , 10.1108/09685229810240158
Clive Vermeulen, Rossouw Von Solms, The information security management toolbox – taking the pain out of security management Information Management & Computer Security. ,vol. 10, pp. 119- 125 ,(2002) , 10.1108/09685220210431872
Jan H. P. Eloff, Rossouw Solms, Les Labuschagne, Jan Verschuren, Information Security Management & Small Systems Security ,(2013)