Main Considerations in Elaborating Organizational Information Security Policies

被引:2
作者
Tagarev, Todor [1 ]
Polimirova, Dimitrina [2 ]
机构
[1] Bulgarian Acad Sci, Inst Informat & Commun Technol, Sofia, Bulgaria
[2] Bulgarian Acad Sci, Natl Lab Comp Virol, Sofia, Bulgaria
来源
COMPUTER SYSTEMS AND TECHNOLOGIES | 2019年
关键词
Information security; cybersecurity; policy; information security management;
D O I
10.1145/3345252.3345302
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the increasing reliance on information technologies, cloud services and internet as communications media, businesses, public and societal organizations face growing threats from cyberspace and, respectively, demands to protect sensitive data and information they collect, use, and disseminate. This paper elaborates on the key considerations organisations with more limited resources, such as schools, universities, research institutes and public organizations need to take into account in designing and implementing a respective information security policy. We start with a description of context and definition of the scope of information security policy, in particular delineating 'information' and 'cyber' security, and provide an overview of the most prominent frameworks and standards. On that basis we elaborate and structure the main areas of an information security policy, the main implementation challenges, and the need to review and amend the policy in a continuous cycle and comprehensive risk management framework. Depending of the specifics of their work, any school, university, institute and municipality may use this elaboration as a starting point in devising its own information security policy.
引用
收藏
页码:68 / 73
页数:6
相关论文
共 17 条
[1]  
Alotaibi Y, 2016, IEEE INT SYMP SIGNAL, P11, DOI 10.1109/ISSPIT.2016.7886001
[2]   Developing an Information Security Policy: A Case Study Approach [J].
Alqahtani, Fayez Hussain .
4TH INFORMATION SYSTEMS INTERNATIONAL CONFERENCE (ISICO 2017), 2017, 124 :691-697
[3]  
[Anonymous], 2016, Adv. Ceram. Sci. Eng
[4]   Cybersecurity Leadership: Competencies, Governance, and Technologies for Industrial Control Systems [J].
Auffret, Jean-Pierre ;
Snowdon, Jane L. ;
Stavrou, Angelos ;
Katz, Jeffrey S. ;
Kelley, Diana ;
Rahman, Rasheq S. ;
Stein, Frank ;
Sokol, Lisa ;
Allor, Peter ;
Warweg, Peng .
Journal of Interconnection Networks, 2017, 17 (01)
[5]   An economic modelling approach to information security risk management [J].
Bojanc, Rok ;
Jerman-Blazic, Borka .
INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2008, 28 (05) :413-422
[6]  
Brotby WK, 2013, PRAGMATIC SECURITY METRICS: APPLYING METAMETRICS TO INFORMATION SECURITY, P1, DOI 10.1201/b14047
[7]  
Georgiev V., 2016, CYBERSECURITY METRIC
[8]  
Kang M, 2018, LANG CULT HIST, P181
[9]   Violators versus non-violators of information security measures in organizations-A study of distinguishing factors [J].
Khan, Habib Ullah ;
AlShare, Khalid A. .
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 2019, 29 (01) :4-23
[10]  
Law on the State Agency, 2007, STATE GAZETTE 1220, V109