2003
DOI: 10.4018/978-1-59140-061-5.ch010
|View full text |Cite
|
Sign up to set email alerts
|

Managing Information Security on a Shoestring Budget

Abstract: As organizations continue to deploy mission-critical, network-centric information systems, managing the security of such systems has become very critical. Building and managing such security infrastructure can be potentially very expensive, especially for small and medium-sized organizations. The Indian Institute of Management, Lucknow (IIML), the premier teaching and research business school in India, embarked on implementing a robust security management infrastructure with a limited budget on hand. The case … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2004
2004
2013
2013

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…Although developing a security program can be challenging, the biggest challenge faced by management is justifying the cost. However, this shouldn't act as a deterrent as, with proper planning, the program can be developed on a shoestring budget (Sridhar & Bhasker, 2003). TKU can significantly improve the security culture and strengthen its security efforts by appointing a chief security officer (Lowendahl, Zastrocky, & Harris,2006).…”
Section: Discussionmentioning
confidence: 99%
“…Although developing a security program can be challenging, the biggest challenge faced by management is justifying the cost. However, this shouldn't act as a deterrent as, with proper planning, the program can be developed on a shoestring budget (Sridhar & Bhasker, 2003). TKU can significantly improve the security culture and strengthen its security efforts by appointing a chief security officer (Lowendahl, Zastrocky, & Harris,2006).…”
Section: Discussionmentioning
confidence: 99%
“…It is not intended to serve as endorsements, source of primary data, or illustrations of effective or ineffective management or to deface or demean anyone. A firewall(FW) is a program/hardware device to protect a network or a computer system by filtering out unwanted traffic (Sridhar and Bhasker, 2003). The filtering decision is based on a set of rules predefined in the security policy.…”
Section: Acknowledgmentmentioning
confidence: 99%
“…PBNM is closely related to information security management, which protects sensitive organizational information from unauthorized access (Young, 2002). In November 2001, IIML deployed a comprehensive information security infrastructure, to address the security needs of its information resources (Sridhar & Bhasker, 2003). A comprehensive security policy document was prepared to cover areas such as identification and authorization control, incident handling, Internet usage, firewall policies and administration, electronic mail usage, and WWW usage (refer to Sridhar & Bhasker, 2003, for details).…”
Section: Policy-based Network Managementmentioning
confidence: 99%
“…Recently most of the ISPs in India have started providing bandwidth management services. However, outsourcing network management requires relinquishing control of customer premise equipment and introduces security risks (Sridhar & Bhasker, 2003). Whether the gear is customer-owned or integrated into the service provided by the operator, tight coordination is required between the ISP and customers to have guaranteed quality of service (Phillips, 2000).…”
Section: Will Proxy Caching Improve Web Performance?mentioning
confidence: 99%