Information security management: An approach to combine process certification and product evaluation

被引:27
|
作者
Eloff, MM [1 ]
von Solms, SH
机构
[1] Technikon Witwatersrand, Sch Informat Technol, Johannesburg, South Africa
[2] Rand Afrikaans Univ, Dept Comp Sci, Johannesburg, South Africa
关键词
certification; controls; standards; guideline; code of practice; accreditation; benchmarking; self-assessment; evaluation criteria; product evaluation; system evaluation and process certification;
D O I
10.1016/S0167-4048(00)08019-6
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information Security (IS) is the key to the effective management of any organisation in today's commercial and industrial sectors. Line managers' performance, for instance, is rated according to the extent to which their operations conform to the IS policies of their respective organizations. In the same way, senior management's performance is judged by how well the organization performs in terms of internationally accepted codes of IS practice. IS management, however, is not always a quantifiable entity and its evaluation is complicated by the fact that it can be viewed either from an electronic perspective, in which case the focus will fall solely on product and/or systems evaluation, or from a procedural rind management perspective, in which care the focus will. instead, fall on the certification of the IS management process. This article will, therefore, be devoted to providing a consolidated approach to the evaluation of IS management. in terms of which full cognisance will be taken of both these perspectives.
引用
收藏
页码:698 / 709
页数:12
相关论文
共 50 条
  • [1] Information security: Process evaluation and product evaluation
    Eloff, MM
    Von Solms, SH
    [J]. INFORMATION SECURITY FOR GLOBAL INFORMATION INFRASTRUCTURES, 2000, 47 : 11 - 18
  • [2] A PROCESS APPROACH TO INFORMATION SECURITY MANAGEMENT
    VONSOLMS, R
    VONSOLMS, SH
    CARROLL, JM
    [J]. COMPUTER SECURITY, 1993, 37 : 385 - 399
  • [3] An Information Security Management Approach for an Electoral Process in Ecuador
    Toapanta Toapanta, Segundo Moises
    Valero Carrillo, Andrea Paola
    Naranjo Sanchez, Bertha Alice
    Mafia Gallegos, Luis Enrique
    [J]. FUZZY SYSTEMS AND DATA MINING V (FSDM 2019), 2019, 320 : 921 - 932
  • [4] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    [J]. SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [5] Paper: a study on the certification of the information security management systems
    Fung, ARW
    Farn, KJ
    Lin, AC
    [J]. COMPUTER STANDARDS & INTERFACES, 2003, 25 (05) : 447 - 461
  • [6] Analytical Hierarchy Process Approach for the Metrics of Information Security Management Framework
    Moeti, Michael
    Kalema, Billy Mathias
    [J]. 2014 SIXTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE, COMMUNICATION SYSTEMS AND NETWORKS (CICSYN), 2014, : 89 - 94
  • [7] The security model to combine the corporate and information security
    Virtanen, T
    [J]. TRUSTED INFORMATION: THE NEW DECADE CHALLENGE, 2001, 65 : 305 - 316
  • [8] The Automating Process of Information Security Management
    Sokolov, Sergey S.
    Alimov, Oleg M.
    Golubeva, Mariy G.
    Burlov, Vyacheslav G.
    Vikhrov, Nikolai M.
    [J]. PROCEEDINGS OF THE 2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS), 2018, : 124 - 127
  • [9] A process framework for information security management
    Haufe, Knut
    Colomo-Palacios, Ricardo
    Dzombeta, Srdan
    Brandis, Knud
    Stantchev, Vladimir
    [J]. IJISPM-INTERNATIONAL JOURNAL OF INFORMATION SYSTEMS AND PROJECT MANAGEMENT, 2016, 4 (04): : 27 - 47
  • [10] New Approach for Information Security Evaluation and Management of IT Systems in Educational Institutions
    Wang M.
    Wang Y.
    Wang T.
    Hou L.
    Li M.
    [J]. Journal of Shanghai Jiaotong University (Science), 2020, 25 (06): : 689 - 699