Abstract
Over the years, information security has moved away from its technical image, and has a wide range of other facets which must all be considered in creating a secure IT environment. This paper addresses these different facets and the way they work together to create a secure IT environment. Focus is on the fact that if information security is not addressed in a holistic and comprehensive way, taking all its dimensions into account, real risks exist preventing a really secure environment.
Original language | English |
---|---|
Pages (from-to) | 504-508 |
Number of pages | 5 |
Journal | Computers and Security |
Volume | 20 |
Issue number | 6 |
DOIs |
|
Publication status | Published - 2001 |
Keywords
- Awarenss
- Best practices
- Certification
- Corporate governance
- Information security
ASJC Scopus subject areas
- General Computer Science
- Law