{"title":"根据BS 7799使用OCTAVE方法设计安全策略","authors":"J. Paulina, P. Marek","doi":"10.1109/ARES.2007.69","DOIUrl":null,"url":null,"abstract":"In the article, authors conduct a discussion concerning a methodology that improves the decision making process for the issues of information protection and management within a company. Authors describe the OCTAVE methodology (the operationally critical threat, asset, and vulnerability evaluation), including examples and refer to many legal regulations. Usage of OCTAVE in the process of creating a security policy is being subject to analysis. The article aims at presenting a methodology, which is successfully used in Western-European countries and proving that it can be adapted for implementations in other countries, fitting well into the policies of various institutions. The authors wish to bring closer the guidelines for creating a security policy and deploying security measures within institutions","PeriodicalId":383015,"journal":{"name":"The Second International Conference on Availability, Reliability and Security (ARES'07)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2007-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"6","resultStr":"{\"title\":\"Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology\",\"authors\":\"J. Paulina, P. Marek\",\"doi\":\"10.1109/ARES.2007.69\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In the article, authors conduct a discussion concerning a methodology that improves the decision making process for the issues of information protection and management within a company. Authors describe the OCTAVE methodology (the operationally critical threat, asset, and vulnerability evaluation), including examples and refer to many legal regulations. Usage of OCTAVE in the process of creating a security policy is being subject to analysis. The article aims at presenting a methodology, which is successfully used in Western-European countries and proving that it can be adapted for implementations in other countries, fitting well into the policies of various institutions. The authors wish to bring closer the guidelines for creating a security policy and deploying security measures within institutions\",\"PeriodicalId\":383015,\"journal\":{\"name\":\"The Second International Conference on Availability, Reliability and Security (ARES'07)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2007-04-10\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"6\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"The Second International Conference on Availability, Reliability and Security (ARES'07)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ARES.2007.69\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"The Second International Conference on Availability, Reliability and Security (ARES'07)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ARES.2007.69","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Designing a Security Policy According to BS 7799 Using the OCTAVE Methodology
In the article, authors conduct a discussion concerning a methodology that improves the decision making process for the issues of information protection and management within a company. Authors describe the OCTAVE methodology (the operationally critical threat, asset, and vulnerability evaluation), including examples and refer to many legal regulations. Usage of OCTAVE in the process of creating a security policy is being subject to analysis. The article aims at presenting a methodology, which is successfully used in Western-European countries and proving that it can be adapted for implementations in other countries, fitting well into the policies of various institutions. The authors wish to bring closer the guidelines for creating a security policy and deploying security measures within institutions