The Use of Best Practice Standards and Guidelines in Information Security Governance

  • S.H. von Solms
  • R von Solms


The authors introduced their Model for Information Security Governance (ISG) in Chapter 4. This Model indicated that Best Practices form a ‘foundation’ on which the other dimensions are placed. The Model is again provided in Fig. 5.1.


Corporate Governance Access Control Information Security Intellectual Property Right Security Incident 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    ISO/IEC 27002 (2005). Information Technology–Security Techniques–Code of Practice for Information Security Management. International Organization for Standardization. Available from
  2. 2.
    Von Solms, SH (2005) Information Security Governance: COBIT or ISO 17799 or Both? Computers & Security, 24(2), 99–104CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC 2009

Authors and Affiliations

  • S.H. von Solms
    • 1
  • R von Solms
    • 2
  1. 1.University of JohannesburgSouth Africa
  2. 2.Nelson Mandela Metropolitan UniversitySouth Africa

Personalised recommendations