2002
DOI: 10.1016/s0167-4048(02)00414-5
|View full text |Cite
|
Sign up to set email alerts
|

The Development of Access Control Policies for Information Technology Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
18
0
1

Year Published

2007
2007
2020
2020

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 36 publications
(20 citation statements)
references
References 1 publication
1
18
0
1
Order By: Relevance
“…Making an inventory record of organizational information assets and classifying assets based on their criticality are the preliminary steps toward asset management. Various key functions of organizational asset management include: asset classification and ownership (BS7799:1999(BS7799: , 1999Ma et al, 2008), risk assessment (Thomson and von Solms, 1998;Musa, 2010), physical access control (Veiga et al, 2007), and access control to IT systems and services (BS7799:1999(BS7799: , 1999Ward and Smith, 2002).…”
Section: Asset Managementmentioning
confidence: 99%
“…Making an inventory record of organizational information assets and classifying assets based on their criticality are the preliminary steps toward asset management. Various key functions of organizational asset management include: asset classification and ownership (BS7799:1999(BS7799: , 1999Ma et al, 2008), risk assessment (Thomson and von Solms, 1998;Musa, 2010), physical access control (Veiga et al, 2007), and access control to IT systems and services (BS7799:1999(BS7799: , 1999Ward and Smith, 2002).…”
Section: Asset Managementmentioning
confidence: 99%
“…Segurança cibernética diz respeito à proteção dos ativos da informação contra exposição não-autorizada, seja ocasional ou mal-intencionada, causando modificação, destruição ou indisponibilidade [Ward & Smith 2002]. Do ponto de vista organizacional, se pode dizer que segurança cibernética é a proteção de recursos de TI contra as mais variadas ameaças, buscando • Confidencialidade: garantia de que o acesso à informação seja feito somente por pessoal autorizado, assim como em relação ao grau de sigilo do conteúdo;…”
Section: Segurança Cibernéticaunclassified
“…Maintaining information security in an organization requires the commitment of employees at all levels. If not, security mechanisms may be diminished or bypassed entirely (Ward and Smith, 2002; Schneier, 2004, Schultz, 2005). Computer based courseware is one common approach to teach employees in information security (European Network and Information Security Agency (ENISA), 2007).…”
Section: Introductionmentioning
confidence: 99%