Information Security Standards: Do you know these basics?

September 2008
Infonomics;Sep/Oct2008, Vol. 22 Issue 5, p21
Trade Publication
The article focuses on the basic information security standards in information management. These standards are regarded to help enterprise content management professionals develop policies and procedures to control and protect information. Significant standards that will guide organizations for guidelines and principles for implementing or improving information security, and to help them establish a security plan, establish objectives and better understand risks are highlighted.


Related Articles

  • INFORMATION SECURITY: State Has Taken Steps to Implement a Continuous Monitoring Application, but Key Challenges Remain.  // GAO Reports;8/8/2011, preceding p1 

    The article presents an overview on the implementation of custom application, iPost and a risk scoring program for continuous monitoring capabilities to the infrastructure of the elements of information technology in the U.S. It notes the continuous monitoring that facilitates real-time risk...

  • Five Things to do to Combat Information Security Threats. Chopra, Anil // PC Quest;Jul2014, p11 

    The article offers tips on how to deal with threats on information security. It suggests to consider information security as top priority in board room. It advises chief information officers not to neglect the basics when framing security policies. The maintenance of basic security protection...

  • Defenders of the System. Waller, Mark; Crombie, Graham // Chartered Accountants Journal;Jun2001, Vol. 80 Issue 5, p4 

    Discusses information security management. Continuing emergence of threats with constant changes in technology; Imperative of continual review and updating of information security policies and technology; Available monitoring resources.

  • Institutional Aspects of Information Security in Russian Economy. Zhanna, Mingaleva; Tatiana, Kapuskina // World Academy of Science, Engineering & Technology;Oct2009, Issue 34, p164 

    The article touches upon questions of information security in Russian Economy. It covers theoretical bases of information security and causes of its development. The theory is proved by the analysis of business activities and the main tendencies of information security development. Perm region...

  • The principle of guarantee availability for security protocol analysis. Bella, Giampaolo // International Journal of Information Security;Apr2010, Vol. 9 Issue 2, p83 

    Conformity to prudent design principles is an established approach to protocol correctness although it is not free of limitations. We term goal availability a design principle that is often implicitly followed, prescribing protocols to aim at principal-centric goals. Adherence to a design...

  • A Threshold Signature Scheme with a Weakened Trusted Party. Yongquan Cai; Fulai Cheng // Journal of Networks;Jun2011, Vol. 6 Issue 6, p883 

    In the (t, n) threshold signature schemes with the assistance of a trusted party, the trusted party easily becomes the targets of attack. And an authority which can be trusted by all players doesn't exist. So the schemes without a trusted party were proposed to solve those security problems. But...

  • The management of information security --A South African case study. Fourie, L. C. H. // South African Journal of Business Management;Jun2003, Vol. 34 Issue 2, p19 

    The growing misuse of information technology and the increased dependence on computer technology and systems heightened the requirements for information security. Unfortunately there often is a feeling of apathy towards information security by management, which leads to an ad hoc approach to...

  • OUR KIND OF TOWN.  // SC Magazine: For IT Security Professionals (15476693);Jan2013, Vol. 24 Issue 1, p29 

    The article discusses the highlights of the SC Congress Chicago hosted by "SC Magazine," held at VenueOne for security professionals.

  • Aligning Security Awareness with Information Systems Security Management. Tsohou, Aggeliki; Karyda, Maria; Kokolakis, Spyros; Kiountouzis, Evangelos // Journal of Information System Security;2010, Vol. 6 Issue 1, p36 

    This paper explores the way information security awareness connects to the overall information security management framework it serves. To date, the formulation of security awareness initiatives has tended to ignore the important relationship with the overall security management context, and...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics