2006 IEEE/IFIP Business Driven IT Management
DOI: 10.1109/bdim.2006.1649213
|View full text |Cite
|
Sign up to set email alerts
|

Enterprise Security Governance; A practical guide to implement and control Information Security Governance (ISG)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(3 citation statements)
references
References 6 publications
0
3
0
Order By: Relevance
“…Costs Will Go Up Businesses and organizations that are serious about defending themselves against scam artists online will need to dig deep into their pockets to cover the increased costs. [11] [12] In general, for companies to comply with the standards for internet safety, they may be needed to confer with a wide variety of legal consultants and professionals. This is so that they can ensure that they are not breaking any of the rules.…”
Section: Definitions: What Exactly Is Network Security?mentioning
confidence: 99%
“…Costs Will Go Up Businesses and organizations that are serious about defending themselves against scam artists online will need to dig deep into their pockets to cover the increased costs. [11] [12] In general, for companies to comply with the standards for internet safety, they may be needed to confer with a wide variety of legal consultants and professionals. This is so that they can ensure that they are not breaking any of the rules.…”
Section: Definitions: What Exactly Is Network Security?mentioning
confidence: 99%
“…The study of de Oliveira Alves, et al [25] considers the governance of information security and therefore puts its primary focus on the strategic orientation. Their model is also based on the basic BSC and proposes indicators which are derived from best practice and which are also part of the CobiT and ISO/IEC 17799 frameworks.…”
Section: Security Scorecards and Recommendationsmentioning
confidence: 99%
“…The module is mainly used for the LAN computer hardware information collection management. It includes the following sub-functions as shown in figure 3: 1) New assets: Technicians, department managers, system administrators can manually add devices, host and peripheral. Host filling parameters are: host number (required), host brand, host type, storage locations, suppliers, maintenance number, purchase date, use units, users and note information.…”
Section: A Asset Management Modulementioning
confidence: 99%