Information security policy -: what do international information security standards say?

被引:91
|
作者
Höne, K [1 ]
Eloff, JHP [1 ]
机构
[1] Rand Afrikaans Univ, Dept Comp Sci, Johannesburg, South Africa
关键词
information security policy; international standards; information security; elements; characteristics;
D O I
10.1016/S0167-4048(02)00504-7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
One of the most important information security controls, is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards. These standards are a good starting Point for determining what the information security policy should consist of, but should not be relied upon exclusively for guidance. Firstly, they are not comprehensive in their coverage and furthermore, tending to rather address the processes needed for successfully implementing the information security policy. It is far more important the information security policy must fit in with the organisation's culture and must therefore be developed with this in mind.
引用
收藏
页码:402 / 409
页数:8
相关论文
共 50 条
  • [41] What are Information Security Ontologies Useful for?
    Sicilia, Miguel-Angel
    Garcia-Barriocanal, Elena
    Bermejo-Higuera, Javier
    Sanchez-Alonso, Salvador
    METADATA AND SEMANTICS RESEARCH, MTSR 2015, 2015, 544 : 51 - 61
  • [42] The Impact of Challenge Information Security Stress on Information Security Policy Compliance: The Mediating Roles of Emotions
    Chen, Lin
    Xie, Zongxiao
    Zhen, Jie
    Dong, Kunxiang
    PSYCHOLOGY RESEARCH AND BEHAVIOR MANAGEMENT, 2022, 15 : 1177 - 1191
  • [43] A Review on Information, Information Security and Security Processes
    Canbek, Gurol
    Sagiroglu, Seref
    JOURNAL OF POLYTECHNIC-POLITEKNIK DERGISI, 2006, 9 (03): : 165 - 174
  • [44] Reducing fraud in organizations through information security policy compliance: An information security controls perspective
    Brown, Dennis
    Batra, Gunjan
    Zafar, Humayun
    Saeed, Khawaja
    COMPUTERS & SECURITY, 2024, 144
  • [45] Limitations of the Information Security Management System Assessment Approaches in the Context of Information Security Policy Assessment
    Corpuz, Maria Soto
    WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV (POST-CONFERENCE EDITION), 2010, : 148 - 150
  • [46] Aligning the information security policy with the strategic information systems plan
    Doherty, NF
    Fulford, H
    COMPUTERS & SECURITY, 2006, 25 (01) : 55 - 63
  • [47] INFORMATION POLICY AS AN ELEMENT OF ENFORCING THE STATE'S INFORMATION SECURITY
    Britchenko, Igor
    Hladchenko, Svitlana
    Viktorova, Lesta
    Pronoza, Inna
    Ulianova, Kateryna
    AD ALTA-JOURNAL OF INTERDISCIPLINARY RESEARCH, 2022, 12 (01): : 110 - 114
  • [48] Information and Information Security
    Henno, Jaak
    INFORMATION MODELLING AND KNOWLEDGE BASES XXVII, 2016, 280 : 103 - 120
  • [49] WHAT THEY SAY AND DO: RELIGIOUS FREEDOM AS A NATIONAL SECURITY LENS
    Patterson, Eric
    REVIEW OF FAITH & INTERNATIONAL AFFAIRS, 2013, 11 (01): : 22 - 30
  • [50] A Conceptual Analysis of Information Security Education, Information Security Training and Information Security Awareness Definitions
    Amankwa, Eric
    Loock, Marianne
    Kritzinger, Elmarie
    2014 9TH INTERNATIONAL CONFERENCE FOR INTERNET TECHNOLOGY AND SECURED TRANSACTIONS (ICITST), 2014, : 248 - 252