Conceptual Information Modelling within the Contemporary Information Security Policies

被引:0
|
作者
Klaic, Aleksandar [1 ]
Golub, Marin [2 ]
机构
[1] Off Natl Secur Council, Zagreb, Croatia
[2] Fac Elect Engn & Comp, Zagreb, Croatia
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The contemporary information security policies are analysed in the paper. These policies are characterised by increased similarities among the information security requirements of different sectors of society. Also, they are characterised by the increased differences in comparison with the traditional approach to the security within the closed environment. Key factors of the information security policy: people, process, and technology, are closely related to the requirements and restrictions imposed on certain type of information. In that way the approach to conceptual information modelling becomes one of the central problems of contemporary information security policies. The paper elaborates the tpproach to the conceptual information modelling, stressing the requirements of both the protection and the sharing of information. It offers the taxonomy of the main terms, which is the base for the development of proposed conceptual model of the information definition and sharing. The conceptual model is based on the standard UML graphical notation that makes it easier to visualize and understand the proposed model and the approach applied in the paper. The proposed model introduces formalized and more structured approach to this field in order to facilitate the development of the solutions that can keep up with the growing complexity of contemporary information security policies.
引用
收藏
页码:1105 / 1110
页数:6
相关论文
共 50 条
  • [1] Policy Components - A Conceptual Model for Tailoring Information Security Policies
    Rostami, Elham
    Karlsson, Fredrik
    Gao, Shang
    [J]. HUMAN ASPECTS OF INFORMATION SECURITY AND ASSURANCE, HAISA 2022, 2022, 658 : 265 - 274
  • [2] Policy components - a conceptual model for modularizing and tailoring of information security policies
    Rostami, Elham
    Karlsson, Fredrik
    Gao, Shang
    [J]. INFORMATION AND COMPUTER SECURITY, 2023, 31 (03) : 331 - 352
  • [3] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    [J]. 2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252
  • [4] Writing information security policies
    Zegiorgis, S
    [J]. TECHNICAL COMMUNICATION, 2002, 49 (03) : 357 - 357
  • [5] Owned policies for information security
    Chen, HB
    Chong, S
    [J]. 17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 126 - 138
  • [6] Information security policies in large organisations: Developing a conceptual framework to explore their impact
    Doherty, NF
    Fulford, H
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 1052 - 1053
  • [7] Conceptual modelling of genomic information
    Paton, NW
    Khan, SA
    Hayes, A
    Moussouni, F
    Brass, A
    Eilbeck, K
    Goble, CA
    Hubbard, SJ
    Oliver, SG
    [J]. BIOINFORMATICS, 2000, 16 (06) : 548 - 557
  • [8] Optimal policies for information sharing in information system security
    Solak, Senay
    Zhuo, Yueran
    [J]. EUROPEAN JOURNAL OF OPERATIONAL RESEARCH, 2020, 284 (03) : 934 - 950
  • [9] A conceptual framework for information security management
    Finne, T
    [J]. COMPUTERS & SECURITY, 1998, 17 (04) : 303 - 307
  • [10] Information risk and security modelling
    Zivic, P
    [J]. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005, 2005, 5812 : 142 - 150