Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

PL EN


2010 | 2 | 2 | 63-80

Article title

It Systems Security Management in Migration Process

Title variants

Languages of publication

EN

Abstracts

EN
This paper looks at the issue of IT systems migration as well as problems related to security policy in migration processes. Problem of migration is viewed in a broad context of changes which occur during construction or modernization of an IT system. Migration projects were classified against the background of wide spectrum of informatization strategy issues and sources of threats to information security were pointed out. Also, guidelines for improvement of security in migration process were presented.

Publisher

Year

Volume

2

Issue

2

Pages

63-80

Physical description

Dates

published
2010-01-01
online
2012-03-20

Contributors

  • Faculty of Management, Warsaw University of Technology, 02-524 Warszawa, Poland

References

  • Polish norm PN-I-13335-1:1999.
  • Denning D. E. - Information Warfare and Security. Addison-Wesley, Massachusetts 1998.
  • Pipkin D. L. - Information Security. WN PWN, Warszawa 2002.
  • Krupa T. - Projektowanie strategii informatyzacji [in] Przedsiębiorstwo w procesie globalizacji (ed. T. Krupa). WNT, Warszawa 2001.
  • Krupa T. - Zarządzanie informacją w zakładzie ubezpieczeń [in] Podstawy ubezpieczeń. t. III. Przedsiębiorstwo (ed. J. Monkiewicz). Wyd Poltext, Warszawa 2003.
  • Pięta S. - Metody doboru zabezpieczeń w systemach informatycznych [in] Komputerowo zintegrowane zarządzanie (ed. R. Knosala). WNT, Warszawa 2003.
  • Pięta S. - Metody doboru optymalnych zabezpieczeń informatycznych na potrzeby przedsiębiorstw [in] Informatyka w przedsiębiorstwie (ed. T. Krupa). Oficyna Wydawnicza PW, Warszawa 2004.
  • Stokłosa J., Bilski T., Pankowski T. - Bezpieczeństwo danych w systemach informatycznych. WN PWN, Warszawa 2001.
  • Kifner T. - Polityka Bezpieczeństwa i Ochrony Informacji. Helion, Gliwice 1999.
  • Schneier B. - Applied Cryptography. Second Edition, John Wiley & Sons, New York 1996.
  • Molski M., Opala S. - Elementarz bezpieczeństwa systemów informatycznych. Mikom, Warszawa 2002.
  • DiS - Migracje ERP 2005. MERP 2005. Raport DiS. Warszawa 2005.[PubMed]
  • IANA - Internet Assigned Numbers Authority.
  • ICANN - Internet Corporation for Assigned Names and Numbers.
  • IFPUG - International Function Point Users Group.
  • OGC - PRINCE2.
  • Project Management Institute - A Guide to the Project Management Body of Knowledge. Third Edition, Paperback PMI, PMBOK Books, Newton Squeare 2009.
  • Morimoto R., Noel M., Droubi O., Gardinier K., Neal N. - Windows 2003 Server. Księga eksperta. Helion, Gliwice 2004.

Document Type

Publication order reference

Identifiers

YADDA identifier

bwmeta1.element.doi-10_2478_v10238-012-0029-4
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.