Information constitutes one of an organisation’s most valuable assets. It provides the modern organisation with a competitive edge and in some cases, is a requirement merely to survive. An organisation has to protect its information but due to the distributed, networked environment of today, faces a difficult challenge; it has to implement a system of information security management. Software applications can provide significant assistance in managing information security. They can be used to provide for centralised feedback of information security related activities as well as for centralised configuration activities. Such an application can be used in enforcing compliance to the organisation’s information security policy document. Current...
Information security has become a much discussed subject all over the world in the last few years. T...
Information technology has dramatically increased online business opportunities; however these oppor...
He article describes and analyzes the basic principles of security software used in the operation of...
Information has become a very important asset in most organizations today. For this reason, it is im...
Information security has moved a long way from the early days when physical security, together with ...
News about various information security attacks against companies appears almost every day. The sour...
The ISO 27001 standard specifies an information security management system (ISMS) as a means to impl...
Abstract –Managing information security should be considered as a focal concern in safeguarding info...
This paper examines using a requirements management tool as a common thread to managing the complexi...
Protecting information assets in organizations is a must and one way for doing it is developing info...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
As the velocity and volume of data breaches increases, information security is a cornerstone to the...
The world has entered the information age. How the information is used within an organization will d...
Information security is one of the key concerns of an enterprise or organization. To assure suitable...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
Information security has become a much discussed subject all over the world in the last few years. T...
Information technology has dramatically increased online business opportunities; however these oppor...
He article describes and analyzes the basic principles of security software used in the operation of...
Information has become a very important asset in most organizations today. For this reason, it is im...
Information security has moved a long way from the early days when physical security, together with ...
News about various information security attacks against companies appears almost every day. The sour...
The ISO 27001 standard specifies an information security management system (ISMS) as a means to impl...
Abstract –Managing information security should be considered as a focal concern in safeguarding info...
This paper examines using a requirements management tool as a common thread to managing the complexi...
Protecting information assets in organizations is a must and one way for doing it is developing info...
During a participation in a security project in an enterprise in Norway, I have been able to get kno...
As the velocity and volume of data breaches increases, information security is a cornerstone to the...
The world has entered the information age. How the information is used within an organization will d...
Information security is one of the key concerns of an enterprise or organization. To assure suitable...
D.Phil.Any organisation is dependent on its information technology resources. The challenges posed b...
Information security has become a much discussed subject all over the world in the last few years. T...
Information technology has dramatically increased online business opportunities; however these oppor...
He article describes and analyzes the basic principles of security software used in the operation of...