ResearchSpace

Best practices show the way to information security maturity

Show simple item record

dc.contributor.author Lessing, MM
dc.date.accessioned 2009-03-06T12:07:01Z
dc.date.available 2009-03-06T12:07:01Z
dc.date.issued 2008-09
dc.identifier.citation Lessing, MM. 2008. Best practices show the way to information security maturity. 6th National Conference on Process Establishment, Assessment and Improvement in Information Technology (ImproveIT 2008), Johannesburg, South Africa, 17-19 September, pp 1-9. en
dc.identifier.uri http://hdl.handle.net/10204/3156
dc.description 6th National Conference on Process Establishment, Assessment and Improvement in Information Technology (ImproveIT 2008), Johannesburg, South Africa, 17 - 19 September 2008 en
dc.description.abstract A Security Maturity Model (SMM) provides an organisation with a distinct Information Security framework. Organisations that conform to these models are likely to pursue satisfactory Information Security. Additionally, the use of Security Maturity Models promotes the use of best practice standards that generally lead to proper Information Security Governance. Based on these two assertions, the hypothesis of this article is that the best practice driven Information Security Governance model is analogous to a Security Maturity Model. Accordingly, organisations can implement the best practice model as a sole tool to ensure Information Security Maturity. This article proves the hypothesis by extracting characteristics from various industry Security Maturity Models and developing a generic Security Maturity Model. The best practice driven model then maps onto the generic Security Maturity Model to prove the analogy. The premise of this study is that the best practice driven Information Security Governance model conforms to all the requirements of the generic Security Maturity Model. The conclusion is that the proper implementation of this model leads to a high Information Security Maturity level en
dc.language.iso en en
dc.subject Information security en
dc.subject Security maturity model (SMM) en
dc.subject ImproveIT 2008 en
dc.title Best practices show the way to information security maturity en
dc.type Conference Presentation en
dc.identifier.apacitation Lessing, M. (2008). Best practices show the way to information security maturity. http://hdl.handle.net/10204/3156 en_ZA
dc.identifier.chicagocitation Lessing, MM. "Best practices show the way to information security maturity." (2008): http://hdl.handle.net/10204/3156 en_ZA
dc.identifier.vancouvercitation Lessing M, Best practices show the way to information security maturity; 2008. http://hdl.handle.net/10204/3156 . en_ZA
dc.identifier.ris TY - Conference Presentation AU - Lessing, MM AB - A Security Maturity Model (SMM) provides an organisation with a distinct Information Security framework. Organisations that conform to these models are likely to pursue satisfactory Information Security. Additionally, the use of Security Maturity Models promotes the use of best practice standards that generally lead to proper Information Security Governance. Based on these two assertions, the hypothesis of this article is that the best practice driven Information Security Governance model is analogous to a Security Maturity Model. Accordingly, organisations can implement the best practice model as a sole tool to ensure Information Security Maturity. This article proves the hypothesis by extracting characteristics from various industry Security Maturity Models and developing a generic Security Maturity Model. The best practice driven model then maps onto the generic Security Maturity Model to prove the analogy. The premise of this study is that the best practice driven Information Security Governance model conforms to all the requirements of the generic Security Maturity Model. The conclusion is that the proper implementation of this model leads to a high Information Security Maturity level DA - 2008-09 DB - ResearchSpace DP - CSIR KW - Information security KW - Security maturity model (SMM) KW - ImproveIT 2008 LK - https://researchspace.csir.co.za PY - 2008 T1 - Best practices show the way to information security maturity TI - Best practices show the way to information security maturity UR - http://hdl.handle.net/10204/3156 ER - en_ZA


Files in this item

This item appears in the following Collection(s)

Show simple item record