dc.contributor.author |
du Toit L.M.
|
en |
dc.contributor.author |
Von Solms S.H.
|
en |
dc.date.accessioned |
2012-11-01T16:31:40Z |
|
dc.date.available |
2012-11-01T16:31:40Z |
|
dc.date.issued |
1993 |
en |
dc.identifier.citation |
IFIP Transactions A: Computer Science and Technology |
en |
dc.identifier.citation |
A-37 |
en |
dc.identifier.isbn |
444817484 |
en |
dc.identifier.issn |
9265473 |
en |
dc.identifier.uri |
http://hdl.handle.net/10500/7576 |
|
dc.description.abstract |
The ISD Model describes a way to organize all relevant security measures, documentation and management's point of view in order to ensure a more effective implementation of information security. The model consists of three levels. Each of these levels represent a separate group of documents used in the attempt to ensure secure information. The Information Security Policy Document (ISPD) forms the top level of the model and serves as the most important factor in encouraging the involvement of top management in the implementation of information security. The second level contains the Goal Document(s) (GD). The purpose of the document or set of documents on this level is to place the ISPD into perspective. Implementation guidelines, which include the detailed procedures and standards, are placed in the Application Guideline Document(s) (AGD) on the lowest level of the ISD Model. Examples are also included. |
en |
dc.language.iso |
en |
en |
dc.publisher |
Publ by Elsevier Science Publishers B.V., Amsterdam, Netherlands |
en |
dc.subject |
Computer science; Data handling; Information dissemination; Information retrieval; Management information systems; Public policy; Standards; Application guideline document (AGD); Goal document (GD); Information security documentation (ISD); Information security policy document (ISPD); Security of data |
en |
dc.title |
Model for organizing information security documentation |
en |
dc.type |
Book |
en |