首页> 外文期刊>International Journal of Business and Management >Using System Dynamics to Investigate the Effect of the Information Medium Contact Policy on the Information Security Management
【24h】

Using System Dynamics to Investigate the Effect of the Information Medium Contact Policy on the Information Security Management

机译:使用系统动力学调查信息介质联系策略对信息安全管理的影响

获取原文
           

摘要

Computer viruses remain the information security threat for business and result a devastating effect on business continuity and profitability. In order to deploy antivirus countermeasures, it is necessary to understand and explore the computer virus propagation. This research explored further the users who contact with media and discuss information security controls, including management and technical. First, we propose the computer viruses propagation model and analysis from system viewpoint. Second, we explore and evaluate the effectiveness of preventive countermeasures. Finally, we suggest several considerations for manager to practice. The simulation results show that users contact with media for network had a significant effect on infection rate and policy enforcement has powerful influence than firewall on restrain infection rate. Based on these results, we suggest: (1) information security management policy development takes precedence over the physical security; (2) it is very important to identify all assets, define the classification of assets, and identify security roles and responsibilities of employees; (3) it is necessary to audit regularly the configurations and the parameters of security techniques; (4) the operating system and the application software on hosts and servers should be updated and patched regularly; (5) the removable storage and removable/mobile access media should be restricted.
机译:计算机病毒仍然是企业的信息安全威胁,并对企业的连续性和盈利能力造成毁灭性影响。为了部署防病毒对策,有必要了解和探索计算机病毒的传播。这项研究进一步探索了与媒体接触并讨论信息安全控制(包括管理和技术)的用户。首先,从系统的角度提出计算机病毒的传播模型和分析。其次,我们探索和评估预防对策的有效性。最后,我们建议经理考虑一些实践。仿真结果表明,用户与网络媒体的接触对感染率有显着影响,策略执行对防火墙的抑制率具有比防火墙更大的影响力。根据这些结果,我们建议:(1)信息安全管理策略的制定优先于物理安全; (2)识别所有资产,定义资产分类并识别员工的安全角色和职责非常重要; (3)有必要定期审核安全技术的配置和参数; (4)主机和服务器上的操作系统和应用软件应定期更新和打补丁; (5)应限制可移动存储和可移动/移动访问介质。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号