Advertisement

Security Management — The Process

  • David W. Roberts
Chapter
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1528)

Abstract

This paper gives a view of the organisational infrastructure necessary for the successful implementation of information technology security. Guidance is given on the writing of security policies, the assessment of risks, the realistic appraisal of threats and the selection of countermeasures. All of the mechanisms available can then be put into their proper place within the organisation to achieve the desired security. Moreover, it will be possible to assess the cost-benefit of each element of the security programme in order to decide on the practical compromises to be made.

Keywords

Security Policy Internal Criminal Security Management Residual Risk Privacy Label 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 1998

Authors and Affiliations

  • David W. Roberts
    • 1
  1. 1.Charmbrights Ltd.USA

Personalised recommendations