DocumentCode
1248652
Title
The four phases of security [Feature: Security Planning]
Author
Bouvier, Patrice
Author_Institution
Thales Security Systems
Volume
2
Issue
1
fYear
2005
Firstpage
20
Lastpage
25
Abstract
Given the large number of information system security measures that exist, organisations find it more and more difficult to distinguish which measures should be granted priority in order to mitigate their information system risks. There are many questions. How do organisations know if the security measures present in their information systems are compatible? What are the steps that should be taken to increase the level of security? What can be done to better protect against incident or malicious activity? How can attacks, or incidents, be more easily discovered? What actions should be taken in the event of an attack? How can information systems be returned to normal operating activity following a disaster? To arrive at simple answers adapted to the context of the organisation, it is recommended that a rigorous approach be adopted. One can respond to these questions by developing a model. This information system security risk management cycle model assists organisations in differentiating among possible security measures to determine those that should be implemented.
fLanguage
English
Journal_Title
Information Professional
Publisher
iet
ISSN
1743-694X
Type
jour
Filename
5308743
Link To Document