Keywords
- Corporate Governance
- Information Security
- Executive Management
- Reference Framework
- Information Security Management
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Information Security Management and Assurance – A Call to Action for Corporate Governance (1997). Available from http://www.theiia.org/download.cfm?file=22398. Accessed 2 April 2008
ISO/IEC 27002 (2005). Information Technology – Security Techniques – Code of Practice for Information Security Management. International Organization for Standardization. Available from www.iso.ch
COBIT (2005). Control Objectives for Information and Related Technology. Available from ISACA. Available from www.isaca.org
ISO/IEC 27001 (2005). Information Technology – Security Techniques – Information Security Management Systems – Requirements, International Organization for Standardization. Available from www.iso.ch
EU Privacy Directive 95/46/EC (1995). Available from http://www.cdt.org/privacy/eudirective/EU_Directive_.html. Accessed 21 March 2008
The Sarbanes-Oxley Act (2002). Available from http://www.soxlaw.com/. Accessed 21 March 2008
HIPAA (1006). The Health Insurance Portability and Accountability Act. Available from http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act. Accessed 21 March 2008
Gramm-Leach-Bliley Act (1999). Available from http://en.wikipedia.org/wiki/Gramm-Leach-Bliley_Act. Accessed 21 March 2008
Information Security Governance – A Call to Action (2004). National Cyber Security Summit Task Force. Available from http://www.entrust.com/news/2004/corporategovernancetaskforce.pdf?entsrc=isgfullreport. Accessed on 2 April 2008
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
von Solms, S., von Solms, R. (2009). Information Security and Information Security Governance. In: Information Security Governance. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-79984-1_3
Download citation
DOI: https://doi.org/10.1007/978-0-387-79984-1_3
Published:
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-79983-4
Online ISBN: 978-0-387-79984-1
eBook Packages: Computer ScienceComputer Science (R0)