Organisations are increasingly dependent on their information. Compromise to this information in terms of loss, inaccuracy or competitors gaining unauthorised access could have devastating consequences for the organisation. Therefore, information security governance has become a major concern for all organisations, large and small. Information security governance is based on a set of policies and internal controls by which organisations direct and manage their information security. An effective information security governance programme should be based on a recognised framework, such as the Control Objectives for Information and related Technology (COBIT). COBIT focuses on what control objectives must be achieved in order to effectively mana...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
COBIT is a collection of good processes and practices for IT governance. It offers the effective mea...
M.Comm.This study will point out the need for information security governance. Since the risk that a...
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sou...
Today the extent and value of electronic data is constantly growing. Dealing across the internet dep...
Security practitioners must be able to build cost-effective security programs while also complying w...
© 2020 Elsevier Ltd Information security is a critical aspect and plays a significant role in protec...
The corporate scandals of the last few years have changed the face of information security and its g...
Today, organisations rely on IT systems which are constantly expected to improve return on investmen...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Abstract- Today, the data and assets are critical for all type of organizations and institutions. Co...
Information security is a critical aspect of information systems usage in current organizations. Oft...
Information technology is considered a sensitive part for most strategies in the global market compe...
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
COBIT is a collection of good processes and practices for IT governance. It offers the effective mea...
M.Comm.This study will point out the need for information security governance. Since the risk that a...
It has been found that many small, medium and micro-sized enterprises (SMMEs) do not comply with sou...
Today the extent and value of electronic data is constantly growing. Dealing across the internet dep...
Security practitioners must be able to build cost-effective security programs while also complying w...
© 2020 Elsevier Ltd Information security is a critical aspect and plays a significant role in protec...
The corporate scandals of the last few years have changed the face of information security and its g...
Today, organisations rely on IT systems which are constantly expected to improve return on investmen...
This chapter identifies various levels of governance followed by a focus on the role of information ...
Abstract- Today, the data and assets are critical for all type of organizations and institutions. Co...
Information security is a critical aspect of information systems usage in current organizations. Oft...
Information technology is considered a sensitive part for most strategies in the global market compe...
Quality security of sensitive data and key assets becomes now a question of absolute necessity for a...
A security policy which includes the appropriate phases of implementation, enforcement, auditing and...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
COBIT is a collection of good processes and practices for IT governance. It offers the effective mea...