Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems

Maryam Saadat, Muhammad Umar Abbasi
{"title":"Information Security Policy Development: the Mechanism to Ensure Security Over Information Technology Systems","authors":"Maryam Saadat, Muhammad Umar Abbasi","doi":"10.31703/girr.2021(iv-iii).04","DOIUrl":null,"url":null,"abstract":"Information security is still in its embryonic phase. The reason is that there are certain malevolent actors in the network that are always looking for loopholes in the system and can harm organizations with their malicious activities. The development of information security policy is very important. It lays the foundations of certain significant standards and procedures that help mitigate the potential risks associated with the organization or its network. The following article has discussed information security policy and its respective development cycle for the implementation of policy infrastructure that could help secure vital data and information in an organization. A framework is explained that demonstrates the construction of a policy, keeping in mind the implementation of an effective security policy. It has elaborated the significance of auditing measures focusing on ISO-27001, the policy specifically designed for information security.","PeriodicalId":154113,"journal":{"name":"Global International Relations Review","volume":"4 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Global International Relations Review","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31703/girr.2021(iv-iii).04","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Information security is still in its embryonic phase. The reason is that there are certain malevolent actors in the network that are always looking for loopholes in the system and can harm organizations with their malicious activities. The development of information security policy is very important. It lays the foundations of certain significant standards and procedures that help mitigate the potential risks associated with the organization or its network. The following article has discussed information security policy and its respective development cycle for the implementation of policy infrastructure that could help secure vital data and information in an organization. A framework is explained that demonstrates the construction of a policy, keeping in mind the implementation of an effective security policy. It has elaborated the significance of auditing measures focusing on ISO-27001, the policy specifically designed for information security.
信息安全政策发展:确保信息技术系统安全的机制
信息安全仍处于萌芽阶段。原因是网络中存在某些恶意行为者,他们总是在寻找系统中的漏洞,并可能通过恶意活动损害组织。信息安全策略的制定非常重要。它为某些重要的标准和程序奠定了基础,有助于减轻与组织或其网络相关的潜在风险。下面的文章讨论了信息安全策略及其各自的开发周期,以实现有助于保护组织中重要数据和信息的策略基础设施。解释了一个框架,该框架演示了策略的构建,并牢记有效安全策略的实现。围绕ISO-27001这一专为信息安全而设计的方针,阐述了审计措施的意义。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信