Kritzinger, 2006 - Google Patents
An information security retrieval and awareness model for industryKritzinger, 2006
View PDF- Document ID
- 2721529670766687148
- Author
- Kritzinger E
- Publication year
- Publication venue
- Dissertation Abstracts International
External Links
Snippet
The present study originated from a realisation that employees in an organisation should be aware of their role and responsibility towards securing the information they work with. Only if employees are aware of their role and responsibilities towards Information Security, could …
- 241000282414 Homo sapiens 0 abstract description 51
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
- G06Q10/0639—Performance analysis
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/12—Accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation, credit approval, mortgages, home banking or on-line banking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Merkow et al. | Information security: Principles and practices | |
Kouns et al. | Information technology risk management in enterprise environments: A review of industry practices and a practical guide to risk management teams | |
Gordon | Official (ISC) 2 guide to the CISSP CBK | |
Conner et al. | Information security governance: a call to action | |
Yildirim | The importance of information security awareness for the success of business enterprises | |
Falco et al. | Confronting cyber risk: An embedded endurance strategy for cybersecurity | |
Brumfield | Cybersecurity risk management: Mastering the fundamentals using the NIST cybersecurity framework | |
Peltier et al. | Complete guide to CISM certification | |
Herzig et al. | Implementing information security in healthcare: Building a security program | |
Axelrod et al. | Enterprise information security and privacy | |
Schreider | Building an effective cybersecurity program | |
Haber et al. | Regulatory compliance | |
Tehan | Cybersecurity: Authoritative reports and resources, by topic | |
Haller et al. | Best practices for national cyber security: Building a national computer security incident management capability | |
Kritzinger | An information security retrieval and awareness model for industry | |
Wright | How cyber security can protect your business: A guide for all stakeholders | |
Cissp | Security software development: assessing and managing security risks | |
Almarshad et al. | Information assurance maturity in Saudi healthcare entities: a developed maturity framework and assessment instrument | |
Ang | A Case Study for Cyber Incident Report in Industrial Control Systems | |
Odularu | Data Security in Accounting and Information Management During the COVID-19 Pandemic | |
Martin et al. | Power sector cybersecurity building blocks | |
Commiato et al. | Information Security Standards: Differences, Benefits, Impacts, and Evolution. | |
Herzig et al. | Information security in healthcare: managing risk | |
Harrison | DOD systems certification and accreditation problems: A qualitative case study | |
Krutz et al. | The CISSP prep guide: mastering the CISSP and ISSEP exams |