In defense of the realm: understanding the threats to information security

被引:87
作者
Whitman, ME [1 ]
机构
[1] Kennesaw State Univ, Dept Comp Sci & Informat Syst, Kennesaw, GA 30144 USA
关键词
D O I
10.1016/j.ijinfomgt.2003.12.003
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
The popular press is replete with information about attacks on information systems. Viruses, worms, hackers, and employee abuse and misuse have created a dramatic need for understanding and implementing quality information security. In order to accomplish this, an organization must begin with the identification and prioritization of the threats it faces, as well as the vulnerabilities inherent in the systems and methods within the organization. This study seeks to identify and rank current threats to information security, and to present current perceptions of the level of severity these threats present. It also seeks to provide information on the frequency of attacks from these threats and the prioritization for expenditures organizations are placing in order to protect against them. The study then will compare these findings with those of previous surveys. (C) 2004 Elsevier Ltd. All rights reserved.
引用
收藏
页码:43 / 57
页数:15
相关论文
共 66 条
[1]  
[Anonymous], 1993, J MANAGE
[2]  
[Anonymous], SPECTACULAR COMPUTER
[3]  
*ASIS, 2001, PROF DEV
[4]  
AUGUST RS, 1983, BARRISTER, P13
[5]   INFORMATION-SYSTEMS SECURITY DESIGN METHODS - IMPLICATIONS FOR INFORMATION-SYSTEMS DEVELOPMENT [J].
BASKERVILLE, R .
COMPUTING SURVEYS, 1993, 25 (04) :375-414
[6]  
BERGERON F, 1990, J SYST MANAGE, V41, P14
[7]  
Blumstein A., 1978, DETERRENCE INCAPACIT
[8]   Catapults and grappling hooks: The tools and techniques of information warfare [J].
Boulanger, A .
IBM SYSTEMS JOURNAL, 1998, 37 (01) :106-114
[9]  
BRANTON P, 1987, INT REV ERGON, V1, P1
[10]  
Cheng H. K., 1997, Journal of Management Information Systems, V13, P49