Title :
Continuous process improvement and the risk to information assurance
Author :
Kalb, George E. ; Masson, Gerald M.
Abstract :
In today´s climate, every good manager should pay attention to the technology gap developing between the deployment of information assurance (IA) products and the technical capabilities of exploiters who can successfully attack an enterprise´s information assets. The growing number of would-be hackers eager to infiltrate a network-based computer system represents an ever-present threat to managers concerned with protecting the information assets those same computer systems host. Managers can counter this threat by acquiring and deploying protection technology within an environment that involves, at best, an incremental improvement process. However; the exploiter of the computer-based system works within a continuous process improvement environment. The difference between the exploiter´s and the manager´s environments creates an IA gap that leaves information assets vulnerable and therefore at risk
Keywords :
DP management; computer network management; risk management; security of data; software process improvement; continuous process improvement; information asset protection; information assurance; network-based computer system; risk management; Availability; Computer hacking; Delay; Information resources; Internet; Protection; Risk management; Sampling methods; Security; Technology management;
Journal_Title :
Software, IEEE