Best Security Practices: An Overview
نویسنده
چکیده
Security technology is important to security, but the practices of the people who develop, integrate, evaluate, configure, maintain, and use that technology are more important; indeed, these practices are the foundation of technical (as well as physical and personnel) security. It is crucially important, therefore, that security practices be good ones; when feasible, best security practices (BSPs) should be used. In Section 2 this paper defines "BSP," asserts the need for multiple levels of goodness among BSPs, and connects the sharing of BSPs to Knowledge Management. Section 3 argues for the use of a security process framework (SPF) to categorize BSPs and describes an SPF that harmonizes three well-known collections of BSPs. Section 4 identifies six important phases, or functions, of the BSP life cycle–namely, identify, package, evaluate, adopt, deliver, and improve–and briefly discusses packaging (offering a format for BSPs) and evaluation (discussing some criteria for such evaluation). A summary concludes the paper.
منابع مشابه
A Comparative Study Of Standards And Practices Related To Information Security Management
The need for Information Security in organisations, regardless of their type and size, is being addressed by emerging standards and recommended best practices. The various standards and practices which evolved in recent years and are still being developed and constantly revised, address the issue of Information Security from different angles. Some of these have gained world-wide recognition thr...
متن کاملInformation Security Policy: A Management Practice Perspective
Considerable research effort has been devoted to the study of Policy in the domain of Information Security Management (ISM). However, our review of ISM literature identified four key deficiencies that reduce the utility of the guidance to organisations implementing policy management practices. This paper provides a comprehensive overview of the management practices of information security polic...
متن کاملFunctional Security Model: A Way to Link Technological Affairs with Companies Management
The information security not only has become a relevant business subject but also a complex decision topic for non-technical people. Legal framework, monitoring security, best practices, standards compliance are part of the security solutions but they can become in the principal complexity affair. This paper shows a general security overview to converge in an initial functional security model i...
متن کاملData and Methods for the Production of National Population Estimates: An Overview and Analysis of Available Metadata
Thomas Spoorenberg Translated by: Elham Fathi Statistical Center of Iran Abstract. Official population estimates can be produced using a variety of data sources and methods. These range from the direct extraction of information from continuously updated population registers to procedures for updating the status of a population enumerated previously in a periodic census. Additional sources and ...
متن کاملIntrusion Detection System Based on Data Mining Techniques
Network security is one of the most important non-functional requirements in a system. Over the years, many software solutions have been developed to enhance network security. Intrusion Detection System (IDS) we have provided an overview of different types of intrusion Detection Systems, the advantages and disadvantages of the same. The need for IDS in a system environment and the generic block...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2000