首页> 外文学位 >An Information Security Control Assessment Methodology for Organizations.
【24h】

An Information Security Control Assessment Methodology for Organizations.

机译:组织的信息安全控制评估方法。

获取原文
获取原文并翻译 | 示例

摘要

In an era where use and dependence of information systems is significantly high, the threat of incidents related to information security that could jeopardize the information held by organizations is more and more serious. Alarming facts within the literature point to inadequacies in information security practices, particularly the evaluation of information security controls in organizations. Research efforts have resulted in various methodologies developed to deal with the information security controls assessment problem. A closer look at these traditional methodologies highlights various weaknesses that can prevent an effective information security controls assessment in organizations. This dissertation develops a methodology that addresses such weaknesses when evaluating information security controls in organizations. The methodology, created using the Fuzzy Logic Toolbox of MATLAB based on fuzzy theory and fuzzy logic, uses fuzzy set theory which allows for a more accurate assessment of imprecise criteria than traditional methodologies. It is argued and evidenced that evaluating information security controls using fuzzy set theory addresses existing weaknesses found in the literature for traditional evaluation methodologies and, thus, leads to a more thorough and precise assessment. This, in turn, results in a more effective selection of information security controls and enhanced information security in organizations.;The main contribution of this research to the information security literature is the development of a fuzzy set theory-based assessment methodology that provides for a thorough evaluation of ISC in organizations. The methodology just created addresses the weaknesses or limitations identified in existing information security control assessment methodologies, resulting in an enhanced information security in organizations.;The methodology can also be implemented in a spreadsheet or software tool, and promote usage in practical scenarios where highly complex methodologies for ISC selection are impractical. Moreover, the methodology fuses multiple evaluation criteria to provide a holistic view of the overall quality of information security controls, and it is easily extended to include additional evaluation criteria factor not considered within this dissertation. This is one of the most meaningful contributions from this dissertation. Finally, the methodology provides a mechanism to evaluate the quality of information security controls in various domains. Overall, the methodology presented in this dissertation proved to be a feasible technique for evaluating information security controls in organizations.
机译:在信息系统的使用和依赖性非常高的时代,与信息安全有关的事件的威胁越来越严重,这些事件可能会危害组织所拥有的信息。文献中令人震惊的事实表明信息安全实践尤其是组织中对信息安全控制的评估不足。研究工作已导致开发出各种方法来处理信息安全控制评估问题。仔细研究这些传统方法会发现各种弱点,这些弱点可能会阻止组织中进行有效的信息安全控制评估。本文提出了一种评估组织中信息安全控制措施时应解决的弱点的方法。该方法是使用基于模糊理论和模糊逻辑的MATLAB模糊逻辑工具箱创建的,使用了模糊集理论,与传统方法相比,该方法可以更精确地评​​估不精确的标准。有论据和证据表明,使用模糊集理论评估信息安全控制解决了传统评估方法在文献中发现的现有弱点,因此导致了更彻底和精确的评估。反过来,这又导致组织中信息安全控制的选择更加有效,并增强了信息安全。本研究对信息安全文献的主要贡献是开发了一种基于模糊集理论的评估方法,该方法可提供对组织中的ISC进行全面评估。刚创建的方法论解决了现有信息安全控制评估方法论中发现的弱点或局限性,从而提高了组织中的信息安全性;该方法论还可以在电子表格或软件工具中实施,并在高度复杂的实际情况下推广使用选择ISC的方法是不切实际的。此外,该方法融合了多种评估标准,以提供信息安全控制整体质量的整体视图,并且可以轻松扩展为包括本文未考虑的其他评估标准因素。这是本论文最有意义的贡献之一。最后,该方法提供了一种评估各个领域信息安全控制质量的机制。总体而言,本文提出的方法论被证明是一种评估组织中信息安全控制的可行技术。

著录项

  • 作者

    Otero, Angel R.;

  • 作者单位

    Nova Southeastern University.;

  • 授予单位 Nova Southeastern University.;
  • 学科 Information Technology.;Business Administration General.
  • 学位 Ph.D.
  • 年度 2014
  • 页码 175 p.
  • 总页数 175
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号