期刊文献+

浅谈企业信息安全治理框架 被引量:4

A Simple Discussion on Information Security Governance Framework
在线阅读 下载PDF
导出
摘要 随着企业的信息化建设,企业信息安全在持续、可靠和稳定运行中面临着巨大考验,因此企业急需开展信息安全治理。论文从企业信息安全治理的实践出发,概述了目前企业信息安全治理存在的问题和困惑,总结了企业实现有效信息安全治理的关注领域和实施内容,为企业建立良好的信息安全治理提供了基本框架。 With the information const,uction of enterprise, the information secudty is facing challenges of continual, reliable and stable operation, so the information security governance construction is an emergency to all the enterprises. This article overviewed the problems and confusions of information security governance, as well as summarized the focus areas and contents of realizing effective information secudty governance based on author' s practical experience, which provided a basic framework of information security governance to enterprise.
作者 赵伯琪
出处 《信息安全与技术》 2013年第5期19-21,共3页
关键词 信息安全 安全治理 框架 风险管理 information security security governance framework risk management
  • 相关文献

参考文献5

二级参考文献29

  • 1叶明芷.浅谈IT治理与信息化建设[J].北京联合大学学报,2005,19(2):15-19. 被引量:5
  • 2叶铭.COBIT信息安全风险评估方法探讨[J].信息网络安全,2005(7):79-80. 被引量:7
  • 3曾聪.IT治理:中国信息化的必由之道——访ITGov中国IT治理研究中心首席专家 孙强[J].电力信息化,2006,4(1):20-22. 被引量:3
  • 4Anti-Phishing Working Group [EB/OL]. http://www.antiphishing. org, 2008-01/2011-12-15.
  • 5PhishTank [EB/OL]. http://www.phishtank.com, 2011-04/2011-12-15.
  • 6Engin Kirda, Christopher Kruegel. Protecting Users against Phishing Attacks[J]. The Computer Journal, 2006, 49(05):554-561.
  • 7Ian Fette, Norman Sadeh, Anthony Tomasic. Learning to Detect Phishing Emails[C]. In Proc. of the WWW 2007, Alberta, Canada, May 8-12, 2007: 649-656.
  • 8Chenfeng Vincent Zhou, Christopher Leckie, Shanika Karunasekera. Collaborative Detection of Fast Flux Phishing Domains[J]. Journal of Networks, 2009, 4(01):75-84.
  • 9D. Kevin McGrath, Minaxi Gupta. Behind Phishing: An Examination of Phisher Modi Operandi[C]. In Proc. of the 1st Usenix Workshop on Large- Scale Exploits and Emergent Threats, California USA, April 15 2008:1-8.
  • 10Tyler Moore, Richard Clayton. The Impact of Incentives on Notice and Take-down[C]. In Proc. of the 7th Workshop on the Economics of Information Security, New Hampshire USA, June 25-28 2007: 1-24.

共引文献107

同被引文献17

引证文献4

二级引证文献11

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部