Information security management: The second generation
โ Scribed by Rossouw von Solms
- Publisher
- Elsevier Science
- Year
- 1996
- Tongue
- English
- Weight
- 907 KB
- Volume
- 15
- Category
- Article
- ISSN
- 0167-4048
No coin nor oath required. For personal study only.
โฆ Synopsis
Information security has moved a long way from the early days when physical security, together with a set of backups, formed the backbone of a company's security controls. Today,information security is all about policies, standards, awareness programs, security strategies, etc. The aim of information security management efforts is to enhance confidence in the effectiveness of the information services within an organization. Unfortunately, this confidence is restricted to the organization itselfand can only, with great effort, be passed on to external parties.
Today, business partners need to link their computer systems for business reasons, but first want to receive some sort of proof that the other partner has got an adequate level of information security in place. A security evaluation and certification scheme that can instill confidence and assurance, regarding information security status, to external business parties will solve a lot of problems for the commercial world. This approach to Information Security Management, to proof adequate information security to external parties, is termed in this paper as; The Second Generation of Information Security Management.
๐ SIMILAR VOLUMES
EDITORIAL REVIEW: Years have passed since the end of the War of the Lance. The people of Ansalon have rebuilt their lives, their houses, their families. The Companions of the Lance, too, have returned to their homes, raising children and putting the days of their heroic deeds behind them.But pe