Alignment for Information Security Professionals, ICT Security Auditors and Regulatory Officials in Implementing Information Security in South Africa

被引:0
|
作者
Basani, Mandla [1 ]
Loock, Marianne [1 ]
Kritzinger, Elmarie [1 ]
机构
[1] Univ S Africa, ZA-0001 Pretoria, South Africa
关键词
Information Security Professionals; ICT Security Auditors; Regulatory Officials; Framework;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Information security is, through IT governance, part of corporate governance. Corporate governance requires that there be structures and processes in place with appropriate checks and balances that enable the directors to discharge their responsibilities. To support this principle means that there must be proper checks and balances for all information security implementations. Achieving this partly requires the involvement of three key role players namely: information security professionals, ICT security auditors and regulatory officials. These three role players must ensure that the information security controls are implemented, properly checked and independently evaluated against the organisation's strategic objectives and the regulatory requirements. In order to ensure effectiveness, the three role players must be aligned in the implementation and evaluation of information security controls. This alignment must be based on a common framework understood and accepted by all three role players. The article presents a South African Information Security Alignment (SAISA) framework to address this.
引用
收藏
页码:1044 / 1053
页数:10
相关论文
共 50 条
  • [21] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [22] Agent Implementing Mode of Information Security Grid
    Ruo, Hu
    Fu, Xie Zan
    WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 566 - 568
  • [23] ICT Crime Cases Autopsy: Using the Adaptive Information Security Systems Model to Improve ICT Security
    Mwakalinga, Jeffy
    Kowalski, Stewart
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 114 - 123
  • [24] Information and Information Security
    Henno, Jaak
    INFORMATION MODELLING AND KNOWLEDGE BASES XXVII, 2016, 280 : 103 - 120
  • [25] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [26] Information security matters: What is information security worth?
    Ross, Steven J.
    ISACA Journal, 2019, 2 : 4 - 6
  • [27] Information Security:A review of information security issues and techniques
    Alkhudhayr, Fatimah
    Alfarraj, Shouq
    Aljameeli, Buthina
    Elkhdiri, Salim
    2019 2ND INTERNATIONAL CONFERENCE ON COMPUTER APPLICATIONS & INFORMATION SECURITY (ICCAIS), 2019,
  • [28] Information security matters: fifty years of information security
    Ross, Steven J.
    ISACA Journal, 2019, 1 : 4 - 6
  • [29] Information and Communication Technology (ICT) and law: The security of information in a sanitary environment
    D'Agostini, David
    Piva, Antonio
    Rampazzo, Attilio
    Mondo Digitale, 2010, 9 (02): : 59 - 66
  • [30] INFORMATION SECURITY
    LIVINGSTON, MS
    BULLETIN OF THE ATOMIC SCIENTISTS, 1956, 12 (05) : 172 - 174