Amazon cover image
Image from Amazon.com

Information security evaluation : a holistic approach Igli Tashi, Solange Ghernaouti-Helie

By: Contributor(s): Material type: TextTextPublication details: Lausanne, Switzerland : EPFL Press, c2011.Description: xii, 201 p. : ill. ; 25 cmISBN:
  • 9781439879153
Subject(s):
Contents:
Chapter 1. What is information security? -- chapter 2. Risk management versus security management -- chapter 3. Information security assurance : an assessment model -- chapter 4. Evaluating the organizational dimension -- chapter 5. Evaluating the functional dimension -- chapter 6. Evaluating the human dimension -- chapter 7. Evaluating the compliance dimension -- chapter 8. Concluding remarks.
Summary: Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and organizations collaborate increasingly with companies, customers, and other stakeholders by technological means. This emphasizes the need for a reliable and secure ICT infrastructure for companies whose principal asset and added value is information. Information Security Evaluation.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
REGULAR University of Wollongong in Dubai Main Collection 658.472 TA IN (Browse shelf(Opens below)) Available T0055208
REGULAR University of Wollongong in Dubai Main Collection 658.472 TA IN (Browse shelf(Opens below)) Available T0055209

Information systems have become a critical element of every organization's structure. A malfunction of the information and communication technology (ICT) infrastructure can paralyze the whole organization and have disastrous consequences at many levels. On the other hand, modern businesses and organizations collaborate increasingly with companies, customers, and other stakeholders by technological means. This emphasizes the need for a reliable and secure ICT infrastructure for companies whose principal asset and added value is information. Information Security Evaluation.

Chapter 1. What is information security? -- chapter 2. Risk management versus security management -- chapter 3. Information security assurance : an assessment model -- chapter 4. Evaluating the organizational dimension -- chapter 5. Evaluating the functional dimension -- chapter 6. Evaluating the human dimension -- chapter 7. Evaluating the compliance dimension -- chapter 8. Concluding remarks.

ISIT937

There are no comments on this title.

to post a comment.