Information Security Evaluation

Information Security Evaluation

4.11 - 1251 ratings - Source

Information systems have become a critical element of every organizationa€™s structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and organizations collaborate increasingly with companies, customers, and other stakeholders by technological means. This emphasizes the need for a reliable and secure ICT infrastructure for companies whose principal asset and added value is information. Information Security Evaluation: A Holistic Approach from a Business Perspective proposes a global and systemic multidimensional integrated approach to the holistic evaluation of the information security posture of an organization. The Information Security Assurance Assessment Model (ISAAM) presented in this book is based on, and integrates, a number of information security best practices, standards, methodologies and sources of research expertise, in order to provide a generic model that can be implemented in organizations of all kinds as part of their efforts towards better governing their information security. This approach will contribute to improving the identification of security requirements, measures and controls. At the same time, it provides a means of enhancing the recognition of evidence related to the assurance, quality and maturity levels of the organizationa€™s security posture, thus driving improved security effectiveness and efficiency. The value added by this evaluation model is that it is easy to implement and operate and that through a coherent system of evaluation it addresses concrete needs in terms of reliance on an efficient and dynamic evaluation tool.system, and it might serve as starting point for problem management.18 The second group is called the security event ... For example, in respect of system monitoring, and especially the IDS technology that might be used, the standard of good ... about this notion can be found within the ITIL method (http://www.itil- Publications/Core.asp) 19 NIST, ... Available at /publications/nistpubs/800-37/SP800-37-final.pdf NIST, a€œDRAFT Guide for Applying the Riskanbsp;...

Title:Information Security Evaluation
Author:Igli Tashi, Solange Ghernaouti-Helie
Publisher:CRC Press - 2011-06-23


You Must CONTINUE and create a free account to access unlimited downloads & streaming