Information Security Management Requirments Model Through Data Life Cycle
Main Article Content
Abstract
Abstract- information security management model through
the data life cycle is a model that can help us to follow and
understand the strategy life of the institution and
determining all probabilities of threats and vulnerabilities of
occurrence and outcomes through implementing it within
the institution. The data life cycle has been chosen that the
data life cycle management enables us to understand our
data, which is an extremely valuable business asset and
which must be managed properly, to ensure business success
and regulatory compliance. Understanding data life cycle
management means to classify and determine rules,
responsibilities and IT needed and determine the
requirement to business targets done in the best way, here
we can say that it is the way to find out the weakness in the
data process and helping us to determine security technical
requirement and provide the security policy.
Article Details
This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
References
Timothy P.Layton, “Information Security”. ISO/IEC17799 ISBN:
, 2006.
Aycock John, “Spyware and Adware” the University of Calgary.
In the USA by Springer Science + Business Media. ISBN:
-0-387-77740-5.
Alison Cartlidge Xansa-Steria, Mark Lillycrop. "an introductory
overview of ITIL". v3 / auth. it SMF UK 2009." The UK Chapter
of it SMF UK"- Vol. 3. ISBN 0-9551245-8-1.
Jacques A. Cazemier, Paul L. Overbeek, Louk M.C. Peters. "Best
Practice for security management". In the United Kingdom, 1999.
ISBN: 0 11 330014X
John .R.Vacca. “Computer and Information Security” .2009 in the
USA. By Morgan Kaufmann Publishers is an imprint of Elsevier.
ISBN: 978-0-12-374354-1.
G. David Garson. 2003 "Public information technology: DOI: https://doi.org/10.4018/978-1-59140-060-8
policy and management issues". In the US by Idea Group
Publishing. ISBN: 1-59740-060-0.
law American Bar Association .2008. “Data of Security
Handbook. Section of Antitrust”. ABA. ISBN - 978-160442-047-0.
Bart Van Ark, Simon K. Kuipers, Gerard H.Kuper.2000
“Productivity,
in the Netherlands ISBN: 0-7923-7960-8.
Nina Godbole. ”Information system security”. 2009.By
Wiley India Pvt. Ltd. ISBN: 8126516925.
Oracle. June 2007. "Information life cycle management of
business data", An Oracle White Paper
www.oracle.com/us/026964.pdf
Information Technology Support Center. 2003. “Best
practices-security plus and policies”.[Online 2008]
www.itsc.state.md.us/info/internetsecurity/bestpractices/se
cpolicy.htm.
Danchev Dancho. Sept 24, 2003. "Building and
Implementing a Successful Information Security
Policy".SANSinstitute[Online]
http://www.sans.org/rr/paper.pnp?id=418.
Storage search. Feb 4, 2002. “Developing a Disaster
Recovery Procedure with Net Vault Backup Software”