首页> 外文会议>IFIP TC11 annual working conference on information security;IFIP world computer congress;WCC2000 >From Trusted Information Security Controls to a Trusted Information Security Environment
【24h】

From Trusted Information Security Controls to a Trusted Information Security Environment

机译:从可信信息安全控制到可信信息安全环境

获取原文

摘要

To protect the information systems of an organisation an appropriate set of security controls needs to be installed and managed properly. Through a risk analysis exercise, the most effective set of controls is recommended. This analysis or identification process can be subjective and many assumptions are made about the environment. A possible solution may be the definition of suitable protection profiles that will include the best suitable security controls for specific information technology environments. This paper will provide some guidelines in the formation of a fully defined security control. Sets of these controls can be used in the determination of an information security profile that will encompass all aspects of security such that no assumptions need to be made, thereby leading towards a totally secure organization.
机译:为了保护组织的信息系统,需要正确安装和管理一组适当的安全控制。通过风险分析,建议采取最有效的控制措施。此分析或识别过程可能是主观的,并且对环境做出了许多假设。可能的解决方案是定义合适的保护配置文件,其中将包括针对特定信息技术环境的最合适的安全控制。本文将为形成完整定义的安全控制提供一些指导。这些控件集可用于确定信息安全配置文件,该文件将涵盖安全性的所有方面,因此无需进行假设,从而可以实现完全安全的组织。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号