Title :
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology
Author :
Paulina, Januszkiewicz ; Marek, Pyka
Author_Institution :
Acad. of Bus., Dqbrowa Gornicza
Abstract :
In the article, authors conduct a discussion concerning a methodology that improves the decision making process for the issues of information protection and management within a company. Authors describe the OCTAVE methodology (the operationally critical threat, asset, and vulnerability evaluation), including examples and refer to many legal regulations. Usage of OCTAVE in the process of creating a security policy is being subject to analysis. The article aims at presenting a methodology, which is successfully used in Western-European countries and proving that it can be adapted for implementations in other countries, fitting well into the policies of various institutions. The authors wish to bring closer the guidelines for creating a security policy and deploying security measures within institutions
Keywords :
information management; legislation; security of data; BS 7799; OCTAVE methodology; asset evaluation; information management; information protection; legal regulation; security measures; security policy design; threat evaluation; vulnerability evaluation; Companies; Costs; Data security; Hardware; Information management; Information security; Law; Legal factors; Protection; Risk management;
Conference_Titel :
Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on
Conference_Location :
Vienna
Print_ISBN :
0-7695-2775-2
DOI :
10.1109/ARES.2007.69