Enterprise Information Security: Who Should Manage it and How?

نویسندگان

  • Vineet Kumar
  • Rahul Telang
  • Tridas Mukhopadhyay
چکیده

In the recent past, Information Security has received a lot of attention in the business and trade press. Much of this can be attributed to an increase in security breaches leading to major losses to the affected enterprises. The CSI/FBI 2005 [4] security survey reports 13 different attack types, ranging from website defacement to financial fraud to Internet worms and viruses. There are several reports in the business press that point to the increasing number of vulnerabilities in commonly used software as well as viruses and other threats that seek to exploit these vulnerabilities, and detail how it is becoming an increasing problem for enterprises. Effective countermeasures sometimes exist for many of these threats, but are often not correctly deployed due to the specific characteristics of the information systems in use, or the capabilities of the IT staff. The economic analysis of information security has many dimensions to it as evidenced by the literature including risk management approaches, insurance, vulnerability analysis, information sharing etc. However, the role of decision making within the enterprise and the related issues of incentives and information asymmetry within a firm has not received much attention in the context of information security. It is our objective to specifically address how a multi-division should make optimal information security deployment decisions in the light of the above factors. Much attention has been focused on detailing the operation of countermeasures (e.g. firewalls that protect against unauthorized traffic) but little attention is focused on who in the enterprise is making decisions regarding deployment of these measures and what policies are in place to deal with such decision-making. When discussing Enterprise security, it is important to understand that enterprises are not homogeneous entities and their divisions often use varied information systems, which are commonly interconnected with each other as well as to the Internet. In addition, some divisions may not value their information assets as highly as others or may not be as capable of expertly deploying security

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Best Practices for Building a Security Operations Center

f one cannot effectively manage the growing volume of security events flooding the enterprise, one cannot secure one's business. Yet IT security teams are now being overwhelmed by literally millions of security-related messages every day. This daily deluge of security data is being generated by the numerous " point " security solutions deployed across the enterprise: firewalls, intrusion preven...

متن کامل

Exploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

متن کامل

Exploring the Type of Relationship between Information Security Management and Organizational Culture (Case Study in TAM Iran Khodro Co.)

A culture conducive to information security practice is extremely important for organizations since information has to be critical assets in modern enterprises. Thus for understanding and improving the organizational behavior with regard to information security, enterprises may look into organizational culture and examine how it affects the effectiveness of implementing ISM. This study aims ...

متن کامل

Convergence of Corporate and Information Security

As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (...

متن کامل

A Case For Information Ownership In Erp Systems

This study investigates the lack of information ownership in current Enterprise Resource Planning (ERP) software systems. The purpose is to show how difficult, time consuming and costly the implementation of security within such systems is. The focus is on the investigation of security implementations within well-known ERP software packages such as SAP R/3 and Oracle EBusiness Suite. The result...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006