A framework for information security evaluation

37Citations
Citations of this article
70Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information Security Management consists of various facets, such as Information Security Policy, Risk Analysis, Risk Management, Contingency Planning and Disaster Recovery; these are all interrelated in some way, often causing uncertainty and confusion among top management. This paper proposes a model for Information Security Management, called an Information Security Management Model (ISM2), which puts all the various facets in context. The model consists of five different levels, defined on a security axis. ISM2 introduces the idea of international security criteria or international security standards. The rationale behind these is to enable information security evaluation according to internationally accepted criteria. Due to the lack of internationally recognized and/or accepted information security standards and criteria, this model cannot be implemented in its totality at this time. A restricted form is implemented, forming an information security evaluation tool. This tool can be used for information security management with great success within an organization. © 1994.

Cite

CITATION STYLE

APA

von Solms, R., van der Haar, H., von Solms, S. H., & Caelli, W. J. (1994). A framework for information security evaluation. Information and Management, 26(3), 143–153. https://doi.org/10.1016/0378-7206(94)90038-8

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free