Institutional Repository

A model for evaluating information security

Show simple item record

dc.contributor.author Barnard, L
dc.contributor.author Von Solms, R
dc.contributor.editor Venter, L
dc.contributor.editor Lombard, R.R.
dc.date.accessioned 2018-08-15T16:24:02Z
dc.date.available 2018-08-15T16:24:02Z
dc.date.issued 2000
dc.identifier.citation Barnard, L. & Von Solms, R. (1997) A model for evaluating information security. Proceedings of the 1997 National Research and Development Conference: Towards 2000, South African Institute of Computer Science and Information Technology), Riverside Sun, 13-14 November, 2000, edited by L.M. Venter and R.R. Lombard (PUCHEE, VTC) en
dc.identifier.isbn 1-86822-300-0
dc.identifier.uri http://hdl.handle.net/10500/24657
dc.description.abstract During the last few decades computing environments have advanced from single user systems to distributed, open environments we all know today. Through these Information Technology advancements, more and more role players moved into the computing arena, resulting in much more and more serious risks threatening the information resources. Information became a very important organizational asset and it needed protection in the same way all other organizational assets needed protection. A few technical controls used to be adequate to protect computing environments of the past, but the highly advanced IT environments of today require more sophisticated protection, and some proof thereof. It is important to realize that, once an organization is trading with business partners through electronic means, then the direct control over information and information resources of the organization is not in the hands of the organization alone anymore. The insecurity of the business partner may threaten the security of that organization [Von Solms, 1997, p.2 1]. Secure business partners is a prerequisite for electronic commerce. A crucial question arises: How can an organization prove adequate information security as a business partner in this age of electronic commerce? The answer to this question lies in information security evaluation and certification. en
dc.language.iso en en
dc.title A model for evaluating information security en


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UnisaIR


Browse

My Account

Statistics