IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Information Security Policy: The Regulatory Basis for the Protection of Information Systems

Information Security Policy: The Regulatory Basis for the Protection of Information Systems
View Sample PDF
Author(s): Edison Fontes (Faculdade de Informática e Administração Paulista (FIAP), Brazil)and Antonio José Balloni (Centro de Tecnologia da Informação Renato Archer (CTI), Brazil)
Copyright: 2016
Pages: 22
Source title: Web Design and Development: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-4666-8619-9.ch003

Purchase

View Information Security Policy: The Regulatory Basis for the Protection of Information Systems on the publisher's website for pricing and purchasing information.

Abstract

In this chapter, the reader finds a structured definition to develop, implement, and keep the needed regulatory rules or principles for an Information System Security (ISS). In addition, the reader finds how to ensure the right use of this ISS, as well as in authorization and protection against disaster situations such as an effective system protection when accessing, storing, using, and retrieving the information in normal or contingency situations. This compound is the structure of information security policy that is based on a set of controls as described in NBR ISO/IEC 27002 (ABNT, 2005). The definition of this structure for the information security policy is important because the Norm ABNT (2005) does not indicate nor define—nor explain—how the structure of this policy should be (i.e., which are the fundamental elements and functions, which are the standards of rules for the controls and other practical issues) so that the policy could be effective for the organization. The structure shown in this chapter represents a practical and useful architecture regarding the elements of the information security policy of the organization.

Related Content

Dina Darwish. © 2024. 28 pages.
Dina Darwish. © 2024. 28 pages.
Muhammad Ahmed, Adnan Ahmad, Furkh Zeshan, Hamid Turab. © 2024. 33 pages.
Pankaj Bhambri. © 2024. 17 pages.
Kaushikkumar Patel. © 2024. 20 pages.
Vijaya Kittu Manda, Arnold Mashud Abukari, Vivek Gupta, Madavarapu Jhansi Bharathi. © 2024. 24 pages.
Pankaj Bhambri. © 2024. 17 pages.
Body Bottom