Information security optimization: from theory to practice

被引:1
|
作者
Simms, David [1 ]
机构
[1] PricewaterhouseCoopers SA, Lausanne, Switzerland
关键词
good practices; information security; risk management; security policy optimization;
D O I
10.1109/ARES.2009.106
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Organizations face a significant challenge in designing and implementing appropriate information security measures. There are many sources of guidance on good and best practice relating to platforms, architectures and industries, but this guidance needs to be interpreted in the context of the specific risks faced by the organization, the desire to mitigate those risks, and the requirements for user friendliness, system performance and system availability driven by the user community. The process of identifying, justifying, implementing and maintaining the correct balance between security and ease of access for authorized users requires careful consideration at a number of phases, including the assessment of risks, the identification of appropriate standards, the definition of policies and the education of users, and organizations also need to implement mechanisms for the regular and effective review and update of the measures taken. This paper discusses the issues involved in implementing an optimized information security policy, the common pitfalls encountered by organizations in this respect, and presents an outline framework for such implementations.
引用
收藏
页码:675 / 680
页数:6
相关论文
共 50 条
  • [1] Information Security Theory and Practice
    Vinaja, Robert
    [J]. JOURNAL OF GLOBAL INFORMATION TECHNOLOGY MANAGEMENT, 2015, 18 (04) : 316 - 318
  • [2] From theory to practice: guidelines for enhancing information security management
    Topa, Ioanna
    Karyda, Maria
    [J]. INFORMATION AND COMPUTER SECURITY, 2019, 27 (03) : 326 - 342
  • [3] 2005 IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security
    [J]. 2005, IEEE Information Theory Society; International Association for Cryptologic Research, IACR (Institute of Electrical and Electronics Engineers Computer Society):
  • [4] Physical Layer Security - From Theory to Practice
    Mitev, Miroslav
    Pham, Thuy M.
    Chorti, Arsenia
    Barreto, Andre Noll
    Fettweis, Gerhard
    [J]. IEEE BITS the Information Theory Magazine, 2023, 3 (02): : 67 - 79
  • [5] Risk-based security: From Theory to Practice
    Thomopoulos, Stelios C. A.
    [J]. SIGNAL PROCESSING, SENSOR/INFORMATION FUSION, AND TARGET RECOGNITION XXX, 2021, 11756
  • [6] Quantitative Information Flow: From Theory to Practice?
    Malacaria, Pasquale
    [J]. COMPUTER AIDED VERIFICATION, PROCEEDINGS, 2010, 6174 : 20 - 22
  • [8] Blading Optimization Reverting from Theory to Practice
    Van Zyl, Gerrie
    [J]. TRANSPORTATION RESEARCH RECORD, 2011, (2204) : 11 - 20
  • [9] Least Squares Optimization: From Theory to Practice
    Grisetti, Giorgio
    Guadagnino, Tiziano
    Aloise, Irvin
    Colosi, Mirco
    Della Corte, Bartolomeo
    Schlegel, Dominik
    [J]. ROBOTICS, 2020, 9 (03)
  • [10] Femtocell Security in Theory and Practice
    van den Broek, Fabian
    Schreur, Ronny Wichers
    [J]. SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 183 - 198