A formalized approach to the effective selection and evaluation of information security controls

被引:21
作者
Barnard, L [1 ]
von Solms, R [1 ]
机构
[1] Port Elizabeth Technikon, Dept Informat Technol, ZA-6000 Port Elizabeth, South Africa
关键词
Security controls;
D O I
10.1016/S0167-4048(00)87829-3
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Electronic commerce holds many advantages for the commercial world, but before it can really take off, the associated information security problems need to be addressed satisfactorily. The identification, implementation and management of the most effective set of controls to provide an adequate level of security is the first step towards this goal. The second step is the possible evaluation and certification of the installed controls in an IT-environment. The selection of the security controls should be driven by the business needs and the associated security requirement. This security requirement should be clearly defined in the information security policy and the security policy should dictate the set of controls that will provide the required protection. If this set of controls can be evaluated and certified as meeting the business needs of the organization, the trust that is required for electronic commerce can be provided. This paper will provide a formalized approach towards identifying a set of controls meeting the business needs and also suggest a model whereby this can be evaluated and certified.
引用
收藏
页码:185 / 194
页数:10
相关论文
共 5 条
  • [1] *BRIT STAND I, 1993, 7799 BS
  • [2] Bruce G., 1997, SECURITY DISTRIBUTED
  • [3] *GISA BSI, 1995, IT BAS PROT MAN
  • [4] *ICIT, 1997, 7799 BS
  • [5] Von Solms R., 1997, Information Management & Computer Security, V5, P20, DOI 10.1108/09685229710168006