Advertisement

The Use of Best Practice Standards and Guidelines in Information Security Governance

  • S.H. von Solms
  • R von Solms
Chapter

Introduction

The authors introduced their Model for Information Security Governance (ISG) in Chapter 4. This Model indicated that Best Practices form a ‘foundation’ on which the other dimensions are placed. The Model is again provided in Fig. 5.1.

Keywords

Corporate Governance Access Control Information Security Intellectual Property Right Security Incident 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    ISO/IEC 27002 (2005). Information Technology–Security Techniques–Code of Practice for Information Security Management. International Organization for Standardization. Available from www.iso.ch
  2. 2.
    Von Solms, SH (2005) Information Security Governance: COBIT or ISO 17799 or Both? Computers & Security, 24(2), 99–104CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • S.H. von Solms
    • 1
  • R von Solms
    • 2
  1. 1.University of JohannesburgSouth Africa
  2. 2.Nelson Mandela Metropolitan UniversitySouth Africa

Personalised recommendations