Information security policy architecture

被引:1
作者
Alam, Mehtab [1 ]
Bokhari, M. U. [2 ]
机构
[1] INMANTEC, Ghaziabad, Uttar Pradesh, India
[2] Aligarh Muslim Univ, Aligarh, Uttar Pradesh, India
来源
ICCIMA 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND MULTIMEDIA APPLICATIONS, VOL IV, PROCEEDINGS | 2007年
关键词
D O I
10.1109/ICCIMA.2007.275
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
The security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. Sound security policies architecture protects organization from attacks as well as accidental internal leakage of information, and data mishandling. This paper presents an architecture which deals the policies implemented at different level in an organization for secure and smooth functioning of business.
引用
收藏
页码:120 / +
页数:2
相关论文
共 50 条
[41]   Automating Information Security Policy Compliance Checking [J].
Mandal, Debashis ;
Mazumdar, Chandan .
PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
[42]   Information security policy compliance model in organizations [J].
Safa, Nader Sohrabi ;
Von Solms, Rossouw ;
Furnell, Steven .
COMPUTERS & SECURITY, 2016, 56 :70-82
[43]   A Generic Framework for Information Security Policy Development [J].
Ismail, Wan Basri Wan ;
Widyarto, Setyawan ;
Ahmad, Raja Ahmad Tariqi Raja ;
Abd Ghani, Khatipah .
2017 4TH INTERNATIONAL CONFERENCE ON ELECTRICAL ENGINEERING, COMPUTER SCIENCE AND INFORMATICS (EECSI), 2017, :320-325
[44]   DEVELOPMENT OF INFORMATION SECURITY POLICY FOR SMART EDUCATION [J].
Barlybayev, A. ;
Abdymanapov, S. ;
Akimbekova, G. .
12TH INTERNATIONAL TECHNOLOGY, EDUCATION AND DEVELOPMENT CONFERENCE (INTED), 2018, :8276-8280
[45]   Rethinking FISMA and federal information security policy [J].
Silvers, Robert .
NEW YORK UNIVERSITY LAW REVIEW, 2006, 81 (05) :1844-1874
[46]   Information Security Policy Compliance: Leadership and Trust [J].
Paliszkiewicz, Joanna .
JOURNAL OF COMPUTER INFORMATION SYSTEMS, 2019, 59 (03) :211-217
[47]   RELATIONSHIP TO INDIVIDUAL INFORMATION SECURITY POLICY VIOLATIONS [J].
Cappellozza, Alexandre ;
da Silva, Camila Bernardo ;
Medeiros, Luciana Arantes ;
de Moraes, Gustavo Herminio Salati Marcondes ;
Perez, Gilberto .
INFORMACAO & SOCIEDADE-ESTUDOS, 2022, 32
[48]   An Information Security Policy Development Life Cycle [J].
Tuyikeze, T. ;
Pottas, D. .
PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, :165-176
[49]   Behavioral Approach to Information Security Policy Compliance [J].
Mady, Ashraf ;
Gupta, Saurabh .
AMCIS 2017 PROCEEDINGS, 2017,
[50]   Evaluation of the Adoption of an Information Systems Security Policy [J].
Lopes, Isabel Maria ;
Oliveira, Pedro .
2015 10TH IBERIAN CONFERENCE ON INFORMATION SYSTEMS AND TECHNOLOGIES (CISTI), 2015,