## Abstract In response to international terrorism, the United States government has actively sought to reorganize information flows to and from individuals, the media, and other nations. These government actions lead to information asymmetry, with certain realms becoming relatively βinformation po
A model for deriving information security control attribute profiles
β Scribed by Helen van der Haar; Rossouw von Solms
- Publisher
- Elsevier Science
- Year
- 2003
- Tongue
- English
- Weight
- 607 KB
- Volume
- 22
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
β¦ Synopsis
How does an organization ensure that all information security loopholes are covered? This paper describes a possible solution in terms of an Information Security Control Attribute Profile for an organization. This profile will dictate attributes that should accompany each and every information security control in an organization, thus minimizing the likelihood of malfunctioning controls.
It is up to the organization to investigate the best way of implementing information security for itself. This is usually done by the implementation of information security controls in the organization. The paper does not suggest which controls to implement, as the literature provides standardized methods for choosing from lists of controls. Rather, the paper suggests which attributes should support every control in an organization.
The organization will be able to derive a set of attributes that should accompany every information security control. The process that should be followed, in order to derive the optimal set of control attributes, is described in a model and presented in this paper. The derived set of control attributes will be called the Information Security Control Attribute
Profile for the organization.
π SIMILAR VOLUMES
Complex software and network based information server systems may exhibit failures. Quite often, such failures may not be accidental. Instead some failures may be caused by deliberate security intrusions with the intent ranging from simple mischief, theft of confidential information to loss of cruci
In this paper a time-discrete dynamic model for the process of disarmament is investigated. The state variables of the system are costs and security values. We assume that the costs can be controlled, and we aim at reducing the costs to zero and achieving non-negative security values after a finite