Information Security, new approach

被引:0
|
作者
Elachgar, Hicham [1 ,2 ]
Regragui, Boubker [1 ]
机构
[1] Natl Sch Comp Sci & Syst Anal, Ave Mohammed Ben Abdallah Regragui,BP 713, Rabat, Morocco
[2] Lab TIES Informat Proc & E Strategy, Rabat, Morocco
关键词
Security; Information; PDCA; ISO; 27001; 27002; ITIL; CObIT; MEHARI; EBIOS; SMSI;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The present paper deals with the 4th wave of the Information Security as a new approach to governance of information security. After introducing the four waves of information security, is focused on the last part which will be part of our thesis. In addition, following the PDCA approach (Plan, Do Check, Act), we will establish an inventory of information system with the SoM (Statement of Maturity), a risk assessment of assets, a business continuity plan to ensure a resumption of IT.
引用
收藏
页码:51 / 56
页数:6
相关论文
共 50 条
  • [1] New Approach in Information System Security Evaluation
    Breier, Jakub
    Hudec, Ladislav
    [J]. 2012 IEEE FIRST AESS EUROPEAN CONFERENCE ON SATELLITE TELECOMMUNICATIONS (ESTEL), 2012,
  • [2] New approach to risk controlling in information security
    Zolotareva, G.
    Zolotarev, V.
    Filko, S.
    [J]. XII INTERNATIONAL SCIENTIFIC AND TECHNICAL CONFERENCE APPLIED MECHANICS AND SYSTEMS DYNAMICS, 2019, 1210
  • [3] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    [J]. 2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2, 2009, : 222 - +
  • [4] A new quantitative approach for information security risk assessment
    Asosheh, Abbas
    Dehmoubed, Bijan
    Khani, Amir
    [J]. ISI: 2009 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2009, : 229 - 229
  • [5] DEFICIENCIES OF THE TRADITIONAL APPROACH TO INFORMATION SECURITY AND THE REQUIREMENTS FOR A NEW METHODOLOGY
    HITCHINGS, J
    [J]. COMPUTERS & SECURITY, 1995, 14 (05) : 377 - 383
  • [6] A New Approach for Information Security using an Improved Steganography Technique
    Juneja, Mamta
    Sandhu, Parvinder Singh
    [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2013, 9 (03): : 405 - 424
  • [7] The economic approach of information security
    Tsiakis, T
    Stephanides, G
    [J]. COMPUTERS & SECURITY, 2005, 24 (02) : 105 - 108
  • [8] INFORMATION SECURITY - A PRACTICAL APPROACH
    STAPLES, E
    [J]. OFFICE ADMINISTRATION AND AUTOMATION, 1985, 46 (01): : 79 - 79
  • [9] Information security - A strategic approach
    Liu, Peng
    [J]. INFORMATION PROCESSING & MANAGEMENT, 2007, 43 (01) : 296 - 296
  • [10] Biological approach to system information security (BASIS): A multi-agent approach to information security
    Skormin, V
    Moronski, J
    McGee, D
    Summerville, D
    [J]. MULTI-AGENT SYSTEMS AND APPLICATIONS III, PROCEEDINGS, 2003, 2691 : 435 - 444