Abstract
This paper gives a view of the organisational infrastructure necessary for the successful implementation of information technology security. Guidance is given on the writing of security policies, the assessment of risks, the realistic appraisal of threats and the selection of countermeasures. All of the mechanisms available can then be put into their proper place within the organisation to achieve the desired security. Moreover, it will be possible to assess the cost-benefit of each element of the security programme in order to decide on the practical compromises to be made.
The author wishes to acknowledge the help and advice given by R.J.Shute in the preparation of this paper
© 1997 Charmbrights Ltd. All rights reserved.D.W.Roberts has asserted the right to be identified as the author of this work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 1998 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Roberts, D.W. (1998). Security Management — The Process. In: State of the Art in Applied Cryptography. Lecture Notes in Computer Science, vol 1528. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-49248-8_18
Download citation
DOI: https://doi.org/10.1007/3-540-49248-8_18
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65474-2
Online ISBN: 978-3-540-49248-1
eBook Packages: Springer Book Archive