Critical Elements of an Information Security Management Strategy

dc.contributor.authorLomprey, Gary R.
dc.date.accessioned2008-10-28T23:25:26Z
dc.date.available2008-10-28T23:25:26Z
dc.date.issued2008-07
dc.description94 p. This paper was completed as part of the final research component in the University of Oregon Applied Information Management Master's Degree Program [see htpp://aim.uoregon.edu].en
dc.description.abstractNot only is Information Security Strategy crucial to protect information systems, but it is central to organization survival. Harris (2006) believes security strategy should be customized because each organization is unique. Literature published from 2000 to 2008 examines information systems in the context of information security. Conclusions provide discussion of six key security policy components selected from ISO-27002 (2005), spanning definitions, objectives, management goals, controls, risk assessment, policies and standards, compliance requirements, and supporting references.en
dc.identifier.urihttps://hdl.handle.net/1794/7613
dc.relation.ispartofseriesAIM Capstone 2008;Gary R. Lomprey
dc.subjectDataen
dc.subjectPolicies and standardsen
dc.subjectCompliance requirementsen
dc.subjectInformation systemsen
dc.subjectAIMen
dc.subjectRisk assessmenten
dc.subjectInformation security strategyen
dc.subjectApplied Information Managementen
dc.titleCritical Elements of an Information Security Management Strategyen
dc.typeOtheren

Files

Original bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
2008-lomprey.pdf
Size:
527.05 KB
Format:
Adobe Portable Document Format
Description:
AIM Terminal Project
License bundle
Now showing 1 - 1 of 1
Name:
license.txt
Size:
1.79 KB
Format:
Item-specific license agreed upon to submission
Description: