Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls

Published: 01 February 2000 Publication History

Abstract

Electronic commerce holds many advantages for the commercial world, but before it can really take off, the associated information security problems need to be addressed satisfactorily. The identification, implementation and management of the most effective set of controls to provide an adequate level of security is the first step towards this goal. The second step is the possible evaluation and certification of the installed controls in an IT-environment. The selection of the security controls should be driven by the business needs and the associated security requirement. This security requirement should be clearly defined in the information security policy and the security policy should dictate the set of controls that will provide the required protection. If this set of controls can be evaluated and certified as meeting the business needs of the organization, the trust that is required for electronic commerce can be provided. This paper will provide a formalized approach towards identifying a set of controls meeting the business needs and also suggest a model whereby this can be evaluated and certified.

References

[1]
British Standards Institute (1993). BS 7799 : Code of practice for information security management (CoP). PD0003, United Kingdom.
[2]
Bruce, G. & Dempsey, R. (1997) Security in distributed computing. New Jersey : Prentice-Hall.
[3]
Institute for Certification of Information Technology (ICIT). (1997). Scheme for self assessment and certification of information security against BS 7799.
[4]
Von Solms, R. (1997). Driving safely on the information superhighway. Information management & computer security, 5(1), pp. 20 - 22.

Cited By

View all
  • (2020)Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environmentJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-17969238:5(6075-6088)Online publication date: 1-Jan-2020
  • (2018)Applying a Security Management Mechanism to a System Development LifecycleInternational Journal of E-Adoption10.4018/IJEA.201801010110:1(1-17)Online publication date: 1-Jan-2018
  • (2017)Ranking information security controls by using fuzzy analytic hierarchy processInformation Systems and e-Business Management10.1007/s10257-016-0306-y15:1(1-19)Online publication date: 1-Feb-2017
  • Show More Cited By

Index Terms

  1. A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls
      Index terms have been assigned to the content through auto-classification.

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image Computers and Security
      Computers and Security  Volume 19, Issue 2
      February, 2000
      79 pages

      Publisher

      Elsevier Advanced Technology Publications

      United Kingdom

      Publication History

      Published: 01 February 2000

      Qualifiers

      • Article

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)0
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 02 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2020)Combination of AHP and TOPSIS methods for the ranking of information security controls to overcome its obstructions under fuzzy environmentJournal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology10.3233/JIFS-17969238:5(6075-6088)Online publication date: 1-Jan-2020
      • (2018)Applying a Security Management Mechanism to a System Development LifecycleInternational Journal of E-Adoption10.4018/IJEA.201801010110:1(1-17)Online publication date: 1-Jan-2018
      • (2017)Ranking information security controls by using fuzzy analytic hierarchy processInformation Systems and e-Business Management10.1007/s10257-016-0306-y15:1(1-19)Online publication date: 1-Feb-2017
      • (2013)Cyber-risk decision modelsDecision Support Systems10.5555/2747904.274821256:C(11-26)Online publication date: 1-Dec-2013
      • (2002)A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security ControlsProceedings of the International Conference on Infrastructure Security10.5555/647333.722880(104-114)Online publication date: 1-Oct-2002
      • (2002)Development of Information Security Baselines for Healthcare Information Systems in New ZealandComputers and Security10.1016/S0167-4048(02)00212-221:2(172-192)Online publication date: 1-Mar-2002

      View Options

      View options

      Get Access

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media