The 10 deadly sins of information security management

نویسندگان

  • Sebastiaan H. von Solms
  • Rossouw von Solms
چکیده

This paper identifies 10 essential aspects, which, if not taken into account in an information security governance plan, will surely cause the plan to fail, or at least, cause serious flaws in the plan. These 10 aspects can be used as a checklist by management to ensure that a comprehensive plan has been defined and introduced. a 2004 Elsevier Ltd. All rights reserved.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Seven deadly sins of environmental epidemiology and the virtues of precaution.

The potentials for error in planning, conducting, reporting, and utilizing epidemiologic results can be considered in terms of the traditional 7 deadly sins. To counter these sins, epidemiologic virtues should be inspired by the precautionary principle. The remedies emphasize acknowledgment and exploration of the impact of uncertainties, weight-of-the-evidence assessments that consider what cou...

متن کامل

Searching For Unlawful Carnal Knowledge

Search engines are often used for leisure related search tasks, to find online shops, games, music, movies, celebrity gossip and even sex. While these activities can be broadly considered as entertainment, I shall focus on discussing the different Sexual Information Needs (SINs) of users. This unexplored area of Information Retrieval (IR) research considers a variety of search tasks related to ...

متن کامل

Acedia: Its Evolution from Deadly Sin to Psychiatric Syndrome.

lohannes Cassianus, more commonly known as John Cassian, wrote his treatise De Institutis Coenobiorumci de OctoPrincipalium Vitiorum Remediis Libri XII around the beginning of the fifth century A.D. This work is important because it introduced certain Eastern ideas into Western thought. Some of these ideas are of considerable psychiatric interest. Cassian first studied with St. Jerome in the Ea...

متن کامل

Critical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)

The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...

متن کامل

The effect of developing the dynamics of library software system on information security management (Case study: Libraries of Islamic Azad universities of the country)

Background and Objective: Information security is of vital importance in most organizations. This is especially central in academic libraries due to the specific type of visitors, exchange and transfer of information to the users. Thus, the purpose   is to investigate the relationship of the development of library software and information security management in the libraries of Islamic Azad Uni...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computers & Security

دوره 23  شماره 

صفحات  -

تاریخ انتشار 2004