Academia.eduAcademia.edu

Outline

Information Security Policy Architecture

2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007)

https://doi.org/10.1109/ICCIMA.2007.275

Abstract

The security policy addresses constraints on functions and flow among them, constraints on access by external systems and adversaries including programs and access to data by people. Sound security policies architecture protects organization from attacks as well as accidental internal leakage of information, and data mishandling. This paper presents an architecture which deals the policies implemented at different level in an organization for secure and smooth functioning of business.

References (2)

  1. The Sans Security Project, URL: http://www.sans.org/resources/policies.
  2. Business and Finance Bulletin IS-3 Electronic Information Security, University of California, Feb. 8, 2005, URL: http://www.ucop.edu/ucophome/policies/bfb/is3.pdf.