The IRMA Community
Newsletters
Research IRM
Click a keyword to search titles using our InfoSci-OnDemand powered search:
|
IT Security Governance and Centralized Security Controls
Abstract
Every enterprise must establish and maintain information technology (IT) governance procedures that will ensure the execution of the firm’s security policies and procedures. This chapter presents the problem and the framework for ensuring that the organization’s policies are implemented over time. Since many of these policies require human involvement (employee and customer actions, for example), the goals are met only if such human activities can be influenced and monitored and if positive outcomes are rewarded while negative actions are sanctioned. This is the challenge to IT governance. One central issue in the context of IT security governance is the degree to which IT security controls should be centralized or decentralized. This issue is discussed in the context of enterprise security management.
Related Content
Margee Hume, Paul Johnston.
© 2017.
19 pages.
|
Jessy Nair, D. Bhanu Sree Reddy.
© 2017.
27 pages.
|
Joseph R. Muscatello, Diane H. Parente, Matthew Swinarski.
© 2017.
19 pages.
|
Klaus Wölfel.
© 2017.
33 pages.
|
Rui Pedro Marques.
© 2017.
21 pages.
|
Ebru E. Saygili, Arikan Tarik Saygili.
© 2017.
17 pages.
|
Aparna Raman, D. P. Goyal.
© 2017.
41 pages.
|
|
|