Full-text resources of CEJSH and other databases are now available in the new Library of Science.
Visit https://bibliotekanauki.pl

Results found: 3

first rewind previous Page / 1 next fast forward last

Search results

Search:
in the keywords:  SECURITY OF INFORMATION SYSTEMS
help Sort By:

help Limit search:
first rewind previous Page / 1 next fast forward last
1
Content available remote

Celowa kreacja kultury bezpieczeństwa

100%
Zarządzanie i Finanse
|
2012
|
vol. 2
|
issue 1
117-125
EN
An extremely important aspect of modern business is security systems. In scientific studies, literature, courses on security issues it is treated very technical and is usually separated from the organization in which it is implemented. Ac-cording to the author one of the basic components of a conscious, full security of information systems should be intentionally created culture of information security. This culture supports the protection of information while supporting the wider objectives of the company. It should be noted the phrase “intentionally created”. Each organization has a culture of safety, which in varying degrees of support or information security. It should, however, to take active steps to improve the existing culture. Contrary to widespread opinion, the culture of security should be considered as a hard factor in the company, and responsibility for the creation and maintenance takes the whole company.
EN
Modern information systems are often complex, heterogeneous and dynamic. Technological progress and widespread use of information systems in business generate dependencies that cause the increase of diversity, complexity, uncertainty and the amount of risk factors. Therefore risk management, focusing on finding the optimal relationship between the risks and the cost of security issues, becomes increasingly important. Risk cannot be completely avoided, so it must be properly managed. Therefore organizations should implement standards, guidelines and best practices. The article presents selected standards concerning a very rapidly developing area which is information security risk management in an organization. The major ISO/IEC standards and selected best practices in this area are presented.
EN
In the literature there are many different maturity models applied in various areas. One of the most famous is the maturity model developed by the Software Engineering Institute. Initially it was developed for software development organizations, but it has evolved and has been applied in other fields. The modern form of this method - CMMI (Capability Maturity Model Integration), is standard, applicable in many areas and branches. The article presents the concept of maturity models as a tool for assessing the existing level of information systems security risk management and for comparing it with the model solution. Thus it is also possible to identify the elements of risk management process that require improvements in order to reach the next - higher level of maturity.
first rewind previous Page / 1 next fast forward last
JavaScript is turned off in your web browser. Turn it on to take full advantage of this site, then refresh the page.