Information security policy architecture

被引:1
|
作者
Alam, Mehtab [1 ]
Bokhari, M. U. [2 ]
机构
[1] INMANTEC, Ghaziabad, Uttar Pradesh, India
[2] Aligarh Muslim Univ, Aligarh, Uttar Pradesh, India
来源
ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS | 2007年
关键词
D O I
10.1109/ICCIMA.2007.275
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. Sound security policies architecture protects organization from attacks as well as accidental internal leakage of information, and data mishandling. This paper presents an architecture which deals the policies implemented at different level in an organization for secure and smooth functioning of business.
引用
收藏
页码:120 / +
页数:2
相关论文
共 50 条
  • [1] BYOD Impact in Architecture and Information Security Corporate Policy
    Carvalho Galego, Nuno Miguel
    Pascoal, Rui Miguel
    Brandao, Pedro Ramos
    2022 17TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2022,
  • [2] Information security policy
    Mead, N
    Anderson, R
    McGraw, G
    Machanick, P
    Bollinger, T
    Shimeall, T
    Pyster, A
    Brown, D
    Draier, E
    Schmidt, H
    IEEE SOFTWARE, 2000, 17 (05) : 26 - 32
  • [3] Information Policy: Does Information Policy lead to Information Security?
    Alhussain, Abdullah
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 6520 - 6523
  • [4] CRYPTOGRAPHY ARCHITECTURE FOR INFORMATION SECURITY
    LENNON, RE
    IBM SYSTEMS JOURNAL, 1978, 17 (02) : 138 - 150
  • [5] Information Security Policy Compliance: The Role of Information Security Awareness
    AL-Omari, Ahmad
    El-Gayar, Omar
    Deokar, Amit
    AMCIS 2012 PROCEEDINGS, 2012,
  • [6] A flexible architecture for security policy enforcement
    McDaniel, P
    Prakash, A
    DARPA INFORMATION SURVIVABILITY CONFERENCE AND EXPOSITION, VOL II, PROCEEDINGS, 2003, : 234 - 239
  • [7] INFORMATION SECURITY POLICY CREATING
    Koziel, Grzegorz
    ACTUAL PROBLEMS OF ECONOMICS, 2011, (126): : 376 - 380
  • [8] Application of Java']Java Security Architecture in Information Security
    Shen Guicheng
    Zheng Xuefeng
    PROCEEDINGS OF FIRST INTERNATIONAL CONFERENCE OF MODELLING AND SIMULATION, VOL III: MODELLING AND SIMULATION IN ELECTRONICS, COMPUTING, AND BIO-MEDICINE, 2008, : 66 - 69
  • [9] Nurse Information Security Policy Compliance, Information Competence, and Information Security Attitudes Predict Information Security Behavior
    Kang, Purum
    Kang, Jiwon
    Monsen, Karen A.
    CIN-COMPUTERS INFORMATICS NURSING, 2023, 41 (08) : 595 - 602
  • [10] Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance
    Park, Minjung
    Chai, Sangmi
    PROCEEDINGS OF THE 51ST ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES (HICSS), 2018, : 4723 - 4731