Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

IS Security Management Framework: A Comprehensive Life Cycle Perspective

IS Security Management Framework: A Comprehensive Life Cycle Perspective
View Free PDF
Author(s): Merrill Warkentin (Mississippi State University, USA), Mark B. Schmidt (Mississippi State University, USA), Allen Johnston (Mississippi State University, USA) and Matthew Boren (Mississippi State University, USA)
Copyright: 2004
Pages: 4
Source title: Innovations Through Information Technology
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59140-261-9.ch121
ISBN13: 9781616921255
EISBN13: 9781466665347


Managers of all enterprises are facing new challenges as their organizations increasingly rely on information technology (IT) for achieving goals and as their IT infrastructure is exposed to new risks. Hackers, viruses, and other threats have become more sophisticated, and newer threats have been introduced. All organizations must react to actual exposure, but should also proactively act to prevent and detect the threats. A comprehensive list of IS security threats is presented. Further, lists of the methods of detection, prevention, and remediation are presented, along with an initial taxonomy of such methods. Finally, a research agenda to explore this important domain in greater detail is presented, along with an initial set of research hypotheses.This research is supported by the Mississippi State University Center for Computer Security Research, and is funded by the National Security Agency, MDA904-02-1-0209.

Body Bottom