- Title
- The development of a technique to establish the security requirements of an organization
- Creator
- Gerber, Mariana
- Subject
- Computer security -- Management
- Subject
- Electronic data processing departments -- Security measures
- Subject
- Businesses -- Data processing -- Security measures
- Subject
- Computers -- Access control
- Date Issued
- 2001
- Date
- 2001
- Type
- Thesis
- Type
- Masters
- Type
- MTech (Information Technology)
- Identifier
- vital:10789
- Identifier
- http://hdl.handle.net/10948/89
- Identifier
- Computer security -- Management
- Identifier
- Electronic data processing departments -- Security measures
- Identifier
- Businesses -- Data processing -- Security measures
- Identifier
- Computers -- Access control
- Description
- To perform their business activities effectively, organizations rely heavily on the use of information (ISO/IEC TR 13335-2, 1996, p 1). Owens (1998) reiterates this by claiming that all organizations depend on information for their everyday operation and without it business will fail to operate (Owens, 1998, p 1-2). For an organization it means that if the right information is not available at the right time, it can make the difference between profit and loss or success and failure (Royds, 2000, p 2). Information is an asset and just like other important business assets within the organization, it has extreme value to an organization (BS 7799-1, 1999, p 1; Humphreys, Moses & Plate, 1998, p 8). For this reason it has become very important that business information is sufficiently protected. There are many different ways in which information can exist. Information can be printed or written on paper, stored electronically, transmitted electronically or by post, even spoken in conversation or any other way in which knowledge and ideas can be conveyed (URN 99/703, 1999, p. 2; Humphreys, Moses & Plate, 1998, p 8; URN 96/702, 1996, p 3).It is, therefore, critical to protect information, and to ensure that the security of IT (Information Technology) systems within organizations is properly managed. This requirement to protect information is even more important today, since many organizations are internally and externally connected by networks of IT systems (ISO/IEC TR 13335-2, 1996, p 1). Information security is therefore required to assist in the process of controlling and securing of information from accidental or malicious changes, deletions or unauthorized disclosure (Royds, 2000, p 2; URN 96/702, 1996, p 3). By preventing and minimizing the impact of security incidents, information security can ensure business continuity and reduce business damage (Owens, 1998, p 7). Information security in an organization can be regarded as a management opportunity and should become an integral part of the whole management activity of the organization. Obtaining commitment from management is therefore extremely important for effective information security. One way in which management can show their commitment to ensuring information security, is to adopt and enforce a security policy. A security policy ensures that people understand exactly what important role they play in securing information assets.
- Format
- x, 214 leaves
- Format
- Publisher
- Port Elizabeth Technikon
- Publisher
- Faculty of Computer Studies
- Language
- English
- Rights
- Nelson Mandela Metropolitan University
- Hits: 1376
- Visitors: 1442
- Downloads: 107
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details Download | SOURCEPDF | 6 MB | Adobe Acrobat PDF | View Details Download |