IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Implementing IT Security for Small and Medium Sized Enterprises

Implementing IT Security for Small and Medium Sized Enterprises
View Sample PDF
Author(s): Edgar R. Weippl (Vienna University of Technology, Austria)and Markus Klemen (Vienna University of Technology, Austria)
Copyright: 2006
Pages: 19
Source title: Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Source Author(s)/Editor(s): Merrill Warkentin (Mississippi State University, USA)and Rayford Vaughn (Mississippi State University, USA)
DOI: 10.4018/978-1-59140-911-3.ch008

Purchase

View Implementing IT Security for Small and Medium Sized Enterprises on the publisher's website for pricing and purchasing information.

Abstract

Small and medium enterprises (SMEs) increasingly depend on their information technology (IT) infrastructure but lack the means to secure it appropriately due to financial restrictions, limited resources, and adequate know-how. For many managers in SMEs, IT security in their company is basically equivalent to having a firewall and updating the antivirus software regularly. Strategic policies, information theft, business continuity, access controls, and many other aspects are only dealt with in case of security incidents. To improve security in a company holistically, four levels (organizational level, workflow level, information level, and technical level) need to be addressed. Parts of existing standards are useful to address issues on the organizational level; Pipkin’s approach is especially useful for SMEs. Modeling of business processes and taking security/dependability into account can improve reliability and robustness of the workflow level. On the information level, role-based access control is state-of the art. On the technical level, basic security measures (antivirus software, firewalls, etc.) need to be addressed and aligned with a corporate security policy.

Related Content

Margee Hume, Paul Johnston. © 2017. 19 pages.
Jessy Nair, D. Bhanu Sree Reddy. © 2017. 27 pages.
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski. © 2017. 19 pages.
Klaus Wölfel. © 2017. 33 pages.
Rui Pedro Marques. © 2017. 21 pages.
Ebru E. Saygili, Arikan Tarik Saygili. © 2017. 17 pages.
Aparna Raman, D. P. Goyal. © 2017. 41 pages.
Body Bottom