Five non-technical pillars of network information security management

Elmarie Kritzinger, S. H. von Solms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Citations (Scopus)

Abstract

Securing information is vital for the survival of many organizations. Therefore, information must be proactively secured against harmful attacks. This securing of information becomes more complex when such information is transmitted over networks. This paper identifies five non-technical pillars (essentials) for network security management. For each pillar a number of specific actions are specified, resulting in a check list for a high level evaluation of the security status of these 5 pillars in a networked environment

Original languageEnglish
Title of host publicationCommunications and Multimedia Security - 8th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
PublisherSpringer New York LLC
Pages277-287
Number of pages11
ISBN (Print)0387244859, 9780387244853
DOIs
Publication statusPublished - 2005
Event8th Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security - Windermere, The Lake District, United Kingdom
Duration: 15 Sept 200418 Sept 2004

Publication series

NameIFIP Advances in Information and Communication Technology
Volume175
ISSN (Print)1868-4238

Conference

Conference8th Annual IFIP TC-6 TC-11 Conference on Communications and Multimedia Security
Country/TerritoryUnited Kingdom
CityWindermere, The Lake District
Period15/09/0418/09/04

Keywords

  • Information security
  • Information security management
  • Network security
  • Non-technical aspects

ASJC Scopus subject areas

  • Information Systems
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Five non-technical pillars of network information security management'. Together they form a unique fingerprint.

Cite this