Analysis of Information Security through Asset Management in Academic Institutes of Pakistan

被引:0
|
作者
Mumtaz, Nadia [1 ]
机构
[1] Punjab Univ, Dept Informat Technol, Jhelum, Pakistan
关键词
asset management; information security policy; ISMS; ISO; 27001; best practices of ISO 27001 for academic institutes;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Assets are the resources used by the organization and play central role to meet the organizational objectives. The most critical asset of an organization is information which can be of any type i.e. electronic or in hard form. Different assets like backup drives, office files in either soft or hard form, networking devices etc. have large amount of information that needs to be protected from unauthorized access. Asset management is the methodical process of maintaining, upgrading and operating the assets. It has great significance to the business community as the value of assets is their influence on accomplishing the predefined organizational objectives. In academic institutes, information asset is used in teaching, research, administration and management, so all the assets containing useful information must be properly managed so that it remains available to the users. Unfortunately information security cannot be guaranteed100% by any mean or method. Therefore there is a need for standards to ensure best security practices to provide adequate level of security. ISO 27001 is one such standard, whose basic objective is to provide requirements for establishing, implementing, maintaining and continuously improving an Information Security Management System (ISMS). ISO 27001 provide complete guidance to the organization about asset management.
引用
收藏
页数:4
相关论文
共 50 条
  • [21] Asset valuation technique for network management and security
    Beaudoin, Luc
    Ing, P.
    [J]. ICDM 2006: Sixth IEEE International Conference on Data Mining, Workshops, 2006, : 718 - 721
  • [22] An Information Security Management for Socio-Technical Analysis of System Security
    Huynen, Jean-Louis
    Lenzini, Gabriele
    [J]. INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, 867 : 222 - 251
  • [23] Information asset valuation method for information technology security risk assessment
    Foroughi, Farhad
    [J]. WORLD CONGRESS ON ENGINEERING 2008, VOLS I-II, 2008, : 576 - 581
  • [24] Information Modeling for Road Asset Management
    Cafiso, S.
    D'Agostino, C.
    Delfino, E.
    Di Graziano, A.
    [J]. INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM-2018), 2019, 2116
  • [25] Asset Information Management: Research Challenges
    Ouertani, Mohamed Z.
    Parlikad, Ajith K.
    McFarlane, Duncan
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON RESEARCH CHALLENGES IN INFORMATION SCIENCE: RCIS 2008, 2007, : 361 - +
  • [26] Research on Information Security Asset Value Assessment Methodology
    Yang, Xueqin
    Yang, Peng
    Lin, Honggang
    [J]. CYBER SECURITY, CNCERT 2022, 2022, 1699 : 162 - 174
  • [27] Information Security Education in the Greek Universities and Technological Education Institutes
    Tsiakis, Theodosios
    [J]. PROCEEDINGS OF THE 9TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2010, : 295 - 301
  • [28] Scientific Information Security in Information Science and Academic Publishing
    Dadkhah, Mehdi
    Stefanutti, Claudia
    Bianciardi, Giorgio
    [J]. ARTIFICIAL ORGANS, 2016, 40 (05) : 425 - 430
  • [29] ANALYSIS OF EXISTING MANAGEMENT INFORMATION SYSTEMS IN BLOOD ESTABLISHMENTS IN PAKISTAN
    Zaheer, H. A.
    Kruzik, H.
    Waheed, U.
    [J]. VOX SANGUINIS, 2013, 105 : 67 - 68
  • [30] A Study on Comparative Analysis of the Information Security Management Systems
    Jo, Heasuk
    Kim, Seungjoo
    Won, Dongho
    [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2010, PT 4, PROCEEDINGS, 2010, 6019 : 510 - 519