INFORMATION SECURITY POLICY CREATING

被引:0
|
作者
Koziel, Grzegorz [1 ]
机构
[1] Lublin Univ Technol, Fac Elect Engn & Comp Sci, Inst Comp Sci, Lublin, Poland
来源
关键词
security; information protection;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Ensuring information protection in large organizations demands a special plan. This plan is called information security policy. Inside this document all important things concerning information security should be written. This document should be given to all people having access to information. It should improve the information security by making people conscious about dangers. An information security policy document together with its attachments is a complex plan of information protection in a large organization.
引用
收藏
页码:376 / 380
页数:5
相关论文
共 50 条
  • [21] Towards Trustworthy Information Sharing by Creating Cyber Security Alliances
    Deljoo, Ameneh
    van Engers, Tom
    Koning, Ralph
    Gommans, Leon
    de Laat, Cees
    [J]. 2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1506 - 1510
  • [22] MATHEMATICAL TOOLS FOR CREATING MODELS OF INFORMATION AND COMMUNICATION NETWORK SECURITY
    Dzhalladova, Irada
    Ruzickova, Miroslava
    [J]. MATHEMATICS, INFORMATION TECHNOLOGIES AND APPLIED SCIENCES 2018, 2018, : 55 - 63
  • [23] INFORMATION POLICY AS AN ELEMENT OF ENFORCING THE STATE'S INFORMATION SECURITY
    Britchenko, Igor
    Hladchenko, Svitlana
    Viktorova, Lesta
    Pronoza, Inna
    Ulianova, Kateryna
    [J]. AD ALTA-JOURNAL OF INTERDISCIPLINARY RESEARCH, 2022, 12 (01): : 110 - 114
  • [24] Aligning the information security policy with the strategic information systems plan
    Doherty, NF
    Fulford, H
    [J]. COMPUTERS & SECURITY, 2006, 25 (01) : 55 - 63
  • [25] Information security policy compliance model in organizations
    Safa, Nader Sohrabi
    Von Solms, Rossouw
    Furnell, Steven
    [J]. COMPUTERS & SECURITY, 2016, 56 : 70 - 82
  • [26] Advanced Security Policy Implementation for Information Systems
    Yusufovna, Sattarova Feruza
    [J]. INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 244 - 247
  • [27] Readability as a Basis for Information Security Policy Assessment
    Alkhurayyif, Yazeed
    Weir, George R. S.
    [J]. 2017 SEVENTH INTERNATIONAL CONFERENCE ON EMERGING SECURITY TECHNOLOGIES (EST), 2017, : 113 - 120
  • [28] Automating Information Security Policy Compliance Checking
    Mandal, Debashis
    Mazumdar, Chandan
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [29] A Generic Framework for Information Security Policy Development
    Ismail, Wan Basri Wan
    Widyarto, Setyawan
    Ahmad, Raja Ahmad Tariqi Raja
    Abd Ghani, Khatipah
    [J]. 2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, : 320 - 325
  • [30] Rethinking FISMA and federal information security policy
    Silvers, Robert
    [J]. NEW YORK UNIVERSITY LAW REVIEW, 2006, 81 (05) : 1844 - 1874