The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
Conceptualizing the Domain and an Empirical Analysis of Operations Security Management
Abstract
Operations security management integrates the activities of all the information systems security controls. It ensures that the entire computing environment is adequately secured. This chapter conducts an in-depth review of scholarly and practitioner works to conceptualize the domain of operations security management. Drawing upon the existing information systems security literature, the chapter classifies operations security management into 10 domains. Following, the chapter performs an empirical analysis to investigate the state-of-practice of operations security management in organizations. The findings show that the maturity level of operations security management is at the Level 3 (well-defined). The maturity levels range from Level 0 (not performed) to Level 5 (continuously improving). The results indicate that operations security processes are documented, approved, and implemented organization-wide. Backup and malware management are the most applied operations security controls, while logging, auditing, monitoring, and reviewing are the least implemented controls.
Related Content
Chirag Sharma, Amanpreet Kaur, Priyanka Datta, Yonis Gulzar.
© 2025.
30 pages.
|
M. Johnpaul, Raam Sai Bharadwaj Miryala, Marica Mazurek, G. Jayaprakashnarayana, Ramesh Kumar Miryala.
© 2025.
28 pages.
|
Jatin Arora, Gaganpreet Kaur, Monika Sethi, Saravjeet Singh.
© 2025.
20 pages.
|
L. A. Anto Gracious, L. Sudha, B. Chitra, Gaganpreet Kaur, V. Sathya, P. Kabitha, R. Siva Subramanian.
© 2025.
28 pages.
|
Bhavik Singla, Anuj Kumar Jain, Gaganpreet Kaur, Nitin Jain, Vishal Jain.
© 2025.
28 pages.
|
P. Vijayalakshmi, K. Subashini, B. Selvalakshmi, G. Sudhakar, Anand Anbalagan, N. Bharathiraja, Gaganpreet Kaur.
© 2025.
22 pages.
|
Djamel Saba, Abdelkader Hadidi.
© 2025.
28 pages.
|
|
|