A study on the optimal model for information security management level

被引:2
|
作者
Cho, Kyong Ho [1 ]
Lee, Dong Hwi [1 ]
Kim, Jeom-Goo [2 ]
Lee, Cheol-Won [3 ]
Seo, Hyung-Jun [3 ]
Kim, Kuinam J. [1 ]
机构
[1] Kyonggi Univ, Dept Informat Secur, 71 Chungjung Ro, Seoul, South Korea
[2] Namseoul Univ, Dept Comp Sci, Cheonan 330707, Choongnam, South Korea
[3] Attached Inst ETRI, Yusung Gu, Dae Jeon, South Korea
来源
ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS | 2008年
关键词
D O I
10.1109/ICISS.2008.18
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The security threat the individual organization and businesses are facing is mixture of malevolent techniques both in the physical and cyber space, and the targets are expanding in the wide areas, and also the range and level of damage is increasing rapidly and broadly. The preferable way to cope with these threats is to promote positive and continuous activities with consistency, such as policy development, classification of assets, recognition of threatening, countermeasures against the intrusion accident, so that the security level which the organization sets the goal at may accomplished. However, it is difficult to cope with all the threatening situations in reality positively, and there are limitations, such as the shortage of budget and physical infrastructures. In this study, therefore, the optimal model for Information Security Management is suggested, so that the organizations planning to achieve the optimal level of security management may refer to it, and the individual organizations and businesses may back up the support of the decision making about the confronting information protecting strategies and build up and evaluate the continuous and systematic security architecture.
引用
收藏
页码:238 / +
页数:2
相关论文
共 50 条
  • [1] A study on security level management model description
    Kim, Tai-Hoon
    Sakurai, Kouichi
    International Journal of Multimedia and Ubiquitous Engineering, 2008, 3 (01): : 87 - 94
  • [2] A Model to Assess the Maturity Level of the Risk Management Process in Information Security
    Mayer, Janice
    Fagundes, Leonardo Lemes
    2009 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT - WORKSHOPS, 2009, : 61 - 70
  • [3] Information security management model
    Cribb, T
    Rao, A
    SAM'03: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, VOLS 1 AND 2, 2003, : 654 - 657
  • [4] Definition of Security Practices in Security Management Part of Security Level Management Model
    Kim, Tai-Hoon
    Sakurai, Kouichi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2008, 2 (01): : 63 - 71
  • [5] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [6] A Study on Information Security Management System Model for Small and Medium Enterprises
    Lee, Wan-Soo
    Jang, Sang-Soo
    RECENT ADVANCES IN E-ACTIVITIES, INFORMATION SECURITY AND PRIVACY, 2009, : 84 - +
  • [7] Study of orgware for information security management
    Zhang, LT
    Cheng, JM
    Qian, XS
    PROGRESS IN SAFETY SCIENCE AND TECHNOLOGY, VOL V, PTS A AND B, 2005, 5 : 464 - 469
  • [8] Study on Information Security of Industry Management
    Li Xuemei
    Li Yan
    Ding Lixing
    2009 ASIA-PACIFIC CONFERENCE ON INFORMATION PROCESSING (APCIP 2009), VOL 1, PROCEEDINGS, 2009, : 522 - +
  • [9] Management of Information Security Indicators under a Cognitive Security Model
    Andrade, Roberto
    Torres, Jenny
    Flores, Pamela
    2018 IEEE 8TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2018, : 478 - 483
  • [10] A Model of Optimal Complexification of Measures Providing Information Security
    Zegzhda, P. D.
    Anisimov, V. G.
    Suprun, A. F.
    Anisimov, E. G.
    Saurenko, T. N.
    Los, V. P.
    AUTOMATIC CONTROL AND COMPUTER SCIENCES, 2020, 54 (08) : 930 - 936