首页> 外文OA文献 >Modeling and Analysis of Information Technology Change and Access Controls in the Business Context
【2h】

Modeling and Analysis of Information Technology Change and Access Controls in the Business Context

机译:业务上下文中信息技术变更和访问控制的建模和分析

摘要

Ongoing field work centered at the Information Technology Process Institute (ITPI) makes clear that processes that control change and access within information technology (IT) management and operations simultaneously reduce security risk and increase efficiency and effectiveness. The CERTu27s Coordination Center is building on this work. This technical note describes a system dynamics model that embodies CERTu27s current hypothesis of why and how these controls reduce the problematic behavior of the low-performing IT operation. CERT has also started to extend the model in ways that reflect the improved performance seen by high performers. In the longer term, the hope is that this model will help to specify, explain, and justify a prescriptive process for integrating change and access controls into organizationsu27 business processes in a way that most effectively reduces security risk and increases IT operational effectiveness and efficiency.
机译:以信息技术过程研究所(ITPI)为中心的正在进行的现场工作明确表明,控制信息技术(IT)管理和运营中的变更和访问的过程可以同时降低安全风险并提高效率和有效性。 CERT的协调中心正在此工作的基础上。本技术说明描述了一个系统动力学模型,该模型体现了CERT当前的假设,即这些控制为何以及如何减少不良IT操作的有问题行为的假设。 CERT还开始以反映高绩效人员所看到的改进性能的方式扩展模型。从长远来看,希望该模型将有助于指定,解释和说明将变更和访问控制集成到组织业务流程中的规定性流程,以最有效地降低安全风险并提高IT运营效率和效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号