Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

THE SPECIFICS OF SECURITY MANAGEMENT: THE FUNCTIONS OF INFORMATION SECURITY REQUIRED BY ORGANIZATIONS

THE SPECIFICS OF SECURITY MANAGEMENT: THE FUNCTIONS OF INFORMATION SECURITY REQUIRED BY... This paper presents the results of a survey illustrating the measurement of security operational activities, the specifics of security management, the organization’s security posture and compliance requirements, the organization’s state of security, and the functions of information security required by organizations. We are specifically interested in how previous research investigated the changing nature of security threats and vulnerabilities, the value of the security process, dynamic and complex IT security environments, the basics of security measurement, and the role of metrics in the security world. JEL: F52, M11, M15 Keywords: security management, information, metrics, threat, vulnerability http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Economics, Management, and Financial Markets Addleton Academic Publishers

THE SPECIFICS OF SECURITY MANAGEMENT: THE FUNCTIONS OF INFORMATION SECURITY REQUIRED BY ORGANIZATIONS

Economics, Management, and Financial Markets , Volume 6 (2): 200-205 – Jan 1, 2011

Loading next page...
 
/lp/addleton-academic-publishers/the-specifics-of-security-management-the-functions-of-information-GezwJhFW3r

References

References for this paper are not available at this time. We will be adding them shortly, thank you for your patience.

Publisher
Addleton Academic Publishers
Copyright
© 2009 Addleton Academic Publishers
ISSN
1842-3191
eISSN
1938-212X
Publisher site
See Article on Publisher Site

Abstract

This paper presents the results of a survey illustrating the measurement of security operational activities, the specifics of security management, the organization’s security posture and compliance requirements, the organization’s state of security, and the functions of information security required by organizations. We are specifically interested in how previous research investigated the changing nature of security threats and vulnerabilities, the value of the security process, dynamic and complex IT security environments, the basics of security measurement, and the role of metrics in the security world. JEL: F52, M11, M15 Keywords: security management, information, metrics, threat, vulnerability

Journal

Economics, Management, and Financial MarketsAddleton Academic Publishers

Published: Jan 1, 2011

There are no references for this article.