Recent technology advancement has resulted in an era where many organisations become more and more comfortable to use computer systems to process their information. Intruders are making it their mission to break into these computer systems and access valuable information in an unauthorised way. Information security policies are seen as not only a counterproposal, but also a solution to information security effectiveness. However, a key issue impacting information security policies is what should be included in these policies. This study makes an attempt to design a Comprehensive Information Security Policy (CISP) to serve as basis for organisations when designing their own information security policies, based on a public survey on IT related governmental information security policies.
Reference:
Ngobeni, SJ and Grobler, MM. 2009. Information security policies for governmental organisations, the minimum criteria. Information Security South Africa (ISSA2009) Conference, University of Johannesburg, Gauteng, South Africa, 6 - 8 July, 2009. pp 1-12
Ngobeni, S., & Grobler, M. (2009). Information security policies for governmental organisations, the minimum criteria. http://hdl.handle.net/10204/3633
Ngobeni, SJ, and MM Grobler. "Information security policies for governmental organisations, the minimum criteria." (2009): http://hdl.handle.net/10204/3633
Ngobeni S, Grobler M, Information security policies for governmental organisations, the minimum criteria; 2009. http://hdl.handle.net/10204/3633 .
Author:Dlamini, Moses T; Eloff, MM; Eloff, JHP; Hone, KDate:Jul 2009The entire business landscape finds itself on the verge of a recession because of ongoing global economic turmoil. Thus, there is a heightened need to minimise and mitigate business risk and scrutinise information spending while ensuring ...Read more
Author:Dlamini, Moses T; Eloff, JHP; Eloff, MMDate:2009Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organisations’ economic growth. This paper investigates the evolution of information security; where it came from, ...Read more
Author:Jansen van Vuuren, JC; Phahlamohlaka, Letlibe J; Brazzoli, MDate:Apr 2010The central argument in this paper is that the exponential increase in internet broadband will result in an increase in security threats that will also take the battlefield to the home of the average citizen in rural South Africa. The paper ...Read more