Information Security Management Requirments Model Through Data Life Cycle

Main Article Content

Musbah Abobaker Musbah

Abstract

Abstract- information security management model through
the data life cycle is a model that can help us to follow and
understand the strategy life of the institution and
determining all probabilities of threats and vulnerabilities of
occurrence and outcomes through implementing it within
the institution. The data life cycle has been chosen that the
data life cycle management enables us to understand our
data, which is an extremely valuable business asset and
which must be managed properly, to ensure business success
and regulatory compliance. Understanding data life cycle
management means to classify and determine rules,
responsibilities and IT needed and determine the
requirement to business targets done in the best way, here
we can say that it is the way to find out the weakness in the
data process and helping us to determine security technical
requirement and provide the security policy.


 

Article Details

How to Cite
Musbah Abobaker Musbah. (2024). Information Security Management Requirments Model Through Data Life Cycle. The International Journal of Engineering & Information Technology (IJEIT), 6(1). https://doi.org/10.36602/ijeit.v6i1.300
Section
Artical

References

Timothy P.Layton, “Information Security”. ISO/IEC17799 ISBN:

, 2006.

Aycock John, “Spyware and Adware” the University of Calgary.

In the USA by Springer Science + Business Media. ISBN:

-0-387-77740-5.

Alison Cartlidge Xansa-Steria, Mark Lillycrop. "an introductory

overview of ITIL". v3 / auth. it SMF UK 2009." The UK Chapter

of it SMF UK"- Vol. 3. ISBN 0-9551245-8-1.

Jacques A. Cazemier, Paul L. Overbeek, Louk M.C. Peters. "Best

Practice for security management". In the United Kingdom, 1999.

ISBN: 0 11 330014X

John .R.Vacca. “Computer and Information Security” .2009 in the

USA. By Morgan Kaufmann Publishers is an imprint of Elsevier.

ISBN: 978-0-12-374354-1.

G. David Garson. 2003 "Public information technology: DOI: https://doi.org/10.4018/978-1-59140-060-8

policy and management issues". In the US by Idea Group

Publishing. ISBN: 1-59740-060-0.

law American Bar Association .2008. “Data of Security

Handbook. Section of Antitrust”. ABA. ISBN - 978-160442-047-0.

Bart Van Ark, Simon K. Kuipers, Gerard H.Kuper.2000

“Productivity,

in the Netherlands ISBN: 0-7923-7960-8.

Nina Godbole. ”Information system security”. 2009.By

Wiley India Pvt. Ltd. ISBN: 8126516925.

Oracle. June 2007. "Information life cycle management of

business data", An Oracle White Paper

www.oracle.com/us/026964.pdf

Information Technology Support Center. 2003. “Best

practices-security plus and policies”.[Online 2008]

www.itsc.state.md.us/info/internetsecurity/bestpractices/se

cpolicy.htm.

Danchev Dancho. Sept 24, 2003. "Building and

Implementing a Successful Information Security

Policy".SANSinstitute[Online]

http://www.sans.org/rr/paper.pnp?id=418.

Storage search. Feb 4, 2002. “Developing a Disaster

Recovery Procedure with Net Vault Backup Software”

Online. http://www.storgesearch.com/bakboneart.html