Article

Risk Analysis Of Cyber-Campus Modules (Security Guidelines Of Electronic Academic Assets)

Authors:
To read the full-text of this research, you can request a copy directly from the author.

No full-text available

Request Full-text Paper PDF

To read the full-text of this research,
you can request a copy directly from the author.

ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The likelihood that the firm's information systems are insufficiently protected against certain kinds of damage or loss is known as "systems risk." Risk can be managed or reduced when managers are aware of the full range of controls available and implement the most effective controls. Unfortunately, they often lack this knowledge, and their subsequent actions to cope with systems risk are less effective than they might otherwise be. This is one viable explanation for why losses from computer abuse and computer disasters today are uncomfortably large and still so potentially devastating after many years of attempting to deal with the problem. Results of comparative qualitative studies in two information services Fortune 500 firms identify an approach that can effectively deal with the problem. This theory-based security program includes (1) use of a security risk planning model, (2) education/training in security awareness, and (3) Countermeasure Matrix analysis.
Article
A structured, progressive approach to the process of risk analysis, problem identification and project definition will contribute to the successful implementation of computer security in an organization. Potential losses of information technology assets need to be identified and quantified. It is critical for the senior management of an organization to be involved in the decision making process regarding the selection of computer security countermeasures. The objectives of this paper are to address the issue of risk analysis in view of an overall information security plan.
ICT: Security Issues To Be Pondered
  • Subariah Mohd Aizaini Maarof
  • Mazleena Ibrahim
  • Salleh
Mohd Aizaini Maarof, Subariah Ibrahim, Mazleena Salleh, "ICT: Security Issues To Be Pondered", Proceedings in International Conference of Education and ICT, October 2000.
Developing an Anti-Virus Security Policy
  • N Engelman
Engelman, N., "Developing an Anti-Virus Security Policy", Cybec Pty Ltd, Available Online http://www.vet.com.au/html/vvcc/anti-virus/
Charlie Kaufman, Radia Perlman, Mike SpecinerNetwork Security Private Communication in a Public World
  • Charles P Pfleeger
Charles P.Pfleeger, Security In Computing, Prentice Hall: United State, 1989.Charlie Kaufman, Radia Perlman, Mike SpecinerNetwork Security Private Communication in a Public World, Prentice Hall: United State, 1995.
Computer Security Policy, Planning and Practice
  • D W Roberts
D.W. Roberts. Computer Security Policy, Planning and Practice, Blenheim Online: London, 1990.
Hackers vs. colleges: Security Bolstered for University Computer Systems
  • E Holsendolph
Holsendolph, E., 2002. "Hackers vs. colleges: Security Bolstered for University Computer Systems", Cox News Service.
Measuring the Value of Information
  • M L Cramer
Cramer, M.L., 1997. "Measuring the Value of Information", Information Warfare Conference 1997, Vienna, Virginia.
Information Security Guidelines for NSW Government Agencies
  • Agencies Nsw Government
NSW Government Agencies, 2001. "Information Security Guidelines for NSW Government Agencies".