Critical Elements of an Information Security Management Strategy
dc.contributor.author | Lomprey, Gary R. | |
dc.date.accessioned | 2008-10-28T23:25:26Z | |
dc.date.available | 2008-10-28T23:25:26Z | |
dc.date.issued | 2008-07 | |
dc.description | 94 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu]. | en |
dc.description.abstract | Not only is Information Security Strategy crucial to protect information systems, but it is central to organization survival. Harris (2006) believes security strategy should be customized because each organization is unique. Literature published from 2000 to 2008 examines information systems in the context of information security. Conclusions provide discussion of six key security policy components selected from ISO-27002 (2005), spanning definitions, objectives, management goals, controls, risk assessment, policies and standards, compliance requirements, and supporting references. | en |
dc.identifier.uri | https://hdl.handle.net/1794/7613 | |
dc.relation.ispartofseries | AIM Capstone 2008;Gary R. Lomprey | |
dc.subject | Data | en |
dc.subject | Policies and standards | en |
dc.subject | Compliance requirements | en |
dc.subject | Information systems | en |
dc.subject | AIM | en |
dc.subject | Risk assessment | en |
dc.subject | Information security strategy | en |
dc.subject | Applied Information Management | en |
dc.title | Critical Elements of an Information Security Management Strategy | en |
dc.type | Other | en |