From trusted information security controls to a trusted information security environment

3Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

To protect the information systems of an organisation an appropriate set of security controls needs to be installed and managed properly. Through a risk analysis exercise, the most effective set of controls is recommended. This analysis or identification process can be subjective and many assumptions are made about the environment. A possible solution may be the definition of suitable protection profiles that will include the best suitable security controls for specific information technology environments. This paper will provide some guidelines in the formation of a fully defined security control. Sets of these controls can be used in the determination of an information security profile that will encompass all aspects of security such that no assumptions need to be made, thereby leading towards a totally secure organization.

Author supplied keywords

Cite

CITATION STYLE

APA

Von Solms, R., & Van de Haar, H. (2017). From trusted information security controls to a trusted information security environment. In IFIP Advances in Information and Communication Technology (Vol. 47, pp. 29–36). Springer New York LLC. https://doi.org/10.1007/978-0-387-35515-3_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free