Security management — the process

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper gives a view of the organisational infrastructure necessary for the successful implementation of information technology security. Guidance is given on the writing of security policies, the assessment of risks, the realistic appraisal of threats and the selection of countermeasures. All of the mechanisms available can then be put into their proper place within the organisation to achieve the desired security. Moreover, it will be possible to assess the cost-benefit of each element of the security programme in order to decide on the practical compromises to be made.

Cite

CITATION STYLE

APA

Roberts, D. W. (1998). Security management — the process. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1528, pp. 366–376). Springer Verlag. https://doi.org/10.1007/3-540-49248-8_18

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free