Information security policy -: what do international information security standards say?

被引:91
|
作者
Höne, K [1 ]
Eloff, JHP [1 ]
机构
[1] Rand Afrikaans Univ, Dept Comp Sci, Johannesburg, South Africa
关键词
information security policy; international standards; information security; elements; characteristics;
D O I
10.1016/S0167-4048(02)00504-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most important information security controls, is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards. These standards are a good starting Point for determining what the information security policy should consist of, but should not be relied upon exclusively for guidance. Firstly, they are not comprehensive in their coverage and furthermore, tending to rather address the processes needed for successfully implementing the information security policy. It is far more important the information security policy must fit in with the organisation's culture and must therefore be developed with this in mind.
引用
收藏
页码:402 / 409
页数:8
相关论文
共 50 条
  • [21] Security standards for medical information systems
    Humphreys, T
    TOWARDS SECURITY IN MEDICAL TELEMATICS: LEGAL AND TECHNICAL ASPECTS, 1996, 27 : 131 - 144
  • [22] Information security standards and global business
    Kajava, Jorma
    Anttila, Juhani
    Varonen, Rauno
    Savola, Reijo
    Roening, Juha
    2006 IEEE International Conference on Industrial Technology, Vols 1-6, 2006, : 2111 - 2115
  • [23] Security standards for the Global Information Grid
    Buda, G
    Choi, D
    Graveman, RF
    Kubic, C
    2001 MILCOM, VOLS 1 AND 2, PROCEEDINGS: COMMUNICATIONS FOR NETWORK-CENTRIC OPERATIONS: CREATING THE INFORMATION FORCE, 2001, : 617 - 621
  • [24] Information security policy development and implementation: The what, how and who
    Flowerday, Stephen V.
    Tuyikeze, Tite
    COMPUTERS & SECURITY, 2016, 61 : 169 - 183
  • [25] Information Security Culture Dimensions in Information Security Policy Compliance Study: A Review
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    ADVANCED SCIENCE LETTERS, 2018, 24 (02) : 943 - 946
  • [26] The human factors issues in information security: What are they and do they matter?
    McCauley-Bell, PR
    Crumpton, LL
    PROCEEDINGS OF THE HUMAN FACTORS AND ERGONOMICS SOCIETY 42ND ANNUAL MEETING, VOLS 1 AND 2, 1998, : 439 - 443
  • [27] The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
    Nasir, Akhyari
    Arshah, Ruzaini Abdullah
    Ab Hamid, Mohd Rashid
    ADVANCED SCIENCE LETTERS, 2018, 24 (10) : 7690 - 7695
  • [28] Framwork for Information Security Standards Storage and Retrieval using Security Patterns
    Ruamjinda, Poramaporn
    Prompoon, Nakornthip
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 296 - 300
  • [29] Installing an appropriate information security policy
    Gaunt, N
    INTERNATIONAL JOURNAL OF MEDICAL INFORMATICS, 1998, 49 (01) : 131 - 134
  • [30] PFIRES: A policy framework for information security
    Rees, J
    Bandyopadhyay, S
    Spafford, EH
    COMMUNICATIONS OF THE ACM, 2003, 46 (07) : 101 - 106