首页> 外文学位 >Regulatory Compliance: Checking the Box and Securing Information Systems.
【24h】

Regulatory Compliance: Checking the Box and Securing Information Systems.

机译:法规遵从性:检查箱子并保护信息系统。

获取原文
获取原文并翻译 | 示例

摘要

Often there is a bit of puzzlement when companies have a massive regulatory compliance component yet end up in the press with major security breaches. This puzzlement attributes to an oft confused idea that a strictly compliant information system is also secure. The misunderstanding is often as the result of the millions of dollars it takes companies to put proper controls in place to meet a satisfactory regulatory assessment or system evaluation.;This dissertation is meant to pose critical questions surrounding the quandary that many companies are left in, after spending the money it takes to become compliant, and yet remain unsecure. Specifically, this dissertation is not meant to replace compliance adherence with security measures. Rather, the idea is to explore the possibility of ranking and weighting regulatory requirements in a security vein. Then, as a company pursues and achieves compliance, there will also flow a security cognizance in that same effort.;Myriad regulations exist that we can choose from for this exercise that for completeness is listed and defined in the literature review. However, dissertation purposes we produce a simple model utilizing like regulatory requirements across Health Insurance Portability and Accountability Act (HIPAA) requirements and Payment Card Industry Data Security Standard PCI-DSS requirements. Comparative security relevance of compliance requirements will be listed and then supported or argued by experienced security professionals. As multiple compliance frameworks are considered only the most security relevant like compliance requirements will be utilized to build a common framework that when applied should both render the information system compliant and more secure. Shane Stailey -- June 2015.
机译:当公司具有大量的法规遵从性组件而最终在媒体上出现重大安全漏洞时,通常会感到困惑。这种困惑归因于一个经常混淆的想法,即严格遵守信息系统也是安全的。这种误解通常是由于公司花了数百万美元来实施适当的控制措施,以满足令人满意的监管评估或系统评估所引起的。本文旨在提出围绕许多公司所面临的难题的关键问题,在花了钱之后才变得合规,但仍然没有安全感。具体而言,本文并不旨在以安全措施代替遵守法规。相反,其想法是探索在安全方面对监管要求进行排名和加权的可能性。然后,当公司追求并实现合规性时,也将以同样的方式进行安全性认知。;存在众多可供选择的法规,我们可以从中进行选择,以确保文献综述中列出并定义了完整性。但是,出于论文目的,我们利用健康保险可移植性和责任法案(HIPAA)要求以及支付卡行业数据安全标准PCI-DSS要求等法规要求,生成了一个简单的模型。将列出合规性要求的相对安全相关性,然后由经验丰富的安全专业人员提供支持或争论。由于考虑了多个合规性框架,因此仅利用与合规性要求最相关的安全性来构建一个通用框架,该通用框架在应用时应使信息系统合规且更加安全。 Shane Stailey-2015年6月。

著录项

  • 作者

    Stailey, Shane D.;

  • 作者单位

    Colorado Technical University.;

  • 授予单位 Colorado Technical University.;
  • 学科 Computer science.;Information science.
  • 学位 D.C.S.
  • 年度 2015
  • 页码 646 p.
  • 总页数 646
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号