Loading…

A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa

Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their i...

Full description

Saved in:
Bibliographic Details
Main Authors: Coertze, J., van Niekerk, J., von Solms, R.
Format: Conference Proceeding
Language:English
Subjects:
Online Access:Request full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by
cites
container_end_page 8
container_issue
container_start_page 1
container_title
container_volume
creator Coertze, J.
van Niekerk, J.
von Solms, R.
description Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.
doi_str_mv 10.1109/ISSA.2011.6027515
format conference_proceeding
fullrecord <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_6027515</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6027515</ieee_id><sourcerecordid>6027515</sourcerecordid><originalsourceid>FETCH-LOGICAL-i90t-2c62de9fe131a9ae7bebc55a76d01e82cccea4dc549a0deac79e59476b14f3ec3</originalsourceid><addsrcrecordid>eNotkMtOwzAURI0EElXpByA2_gEXXz_ieBlVPCoVsWj31Y1zA0Z5IDsV9O-JRFezmDmj0TB2D3INIP3jdr-v1koCrAupnAV7xVbelWCsc2BKra7ZQmkthS9LuGWrnL-klFCUykCxYG3Ff6gWNWZq-HZox9TjFMeB7ymcUpzO_A0H_KCehokfxrGrx18-p3jusevENIqemnjq-exT-k4xU-ZxxsfT9Elp4FWbYsA7dtNil2l10SU7PD8dNq9i9_6y3VQ7Eb2chAqFasi3BBrQI7ma6mAtuqKRQKUKIRCaJljjUTaEwXmy3riiBtNqCnrJHv5rIxEd5zU9pvPxcoz-A6NjWZI</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</title><source>IEEE Xplore All Conference Series</source><creator>Coertze, J. ; van Niekerk, J. ; von Solms, R.</creator><creatorcontrib>Coertze, J. ; van Niekerk, J. ; von Solms, R.</creatorcontrib><description>Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.</description><identifier>ISSN: 2330-9881</identifier><identifier>EISBN: 9781457714832</identifier><identifier>EISBN: 1457714825</identifier><identifier>EISBN: 1457714833</identifier><identifier>EISBN: 9781457714825</identifier><identifier>DOI: 10.1109/ISSA.2011.6027515</identifier><language>eng</language><publisher>IEEE</publisher><subject>automation ; computer security ; computer software ; corporate governance ; enterprise security ; Guidelines ; Information security ; Information technology ; IT governance ; managing information security ; methodologies for securing small/medium size enterprises ; Organizations ; security policy and procedures ; Standards organizations</subject><ispartof>2011 Information Security for South Africa, 2011, p.1-8</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6027515$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,27925,54555,54932</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6027515$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Coertze, J.</creatorcontrib><creatorcontrib>van Niekerk, J.</creatorcontrib><creatorcontrib>von Solms, R.</creatorcontrib><title>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</title><title>2011 Information Security for South Africa</title><addtitle>ISSA</addtitle><description>Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.</description><subject>automation</subject><subject>computer security</subject><subject>computer software</subject><subject>corporate governance</subject><subject>enterprise security</subject><subject>Guidelines</subject><subject>Information security</subject><subject>Information technology</subject><subject>IT governance</subject><subject>managing information security</subject><subject>methodologies for securing small/medium size enterprises</subject><subject>Organizations</subject><subject>security policy and procedures</subject><subject>Standards organizations</subject><issn>2330-9881</issn><isbn>9781457714832</isbn><isbn>1457714825</isbn><isbn>1457714833</isbn><isbn>9781457714825</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotkMtOwzAURI0EElXpByA2_gEXXz_ieBlVPCoVsWj31Y1zA0Z5IDsV9O-JRFezmDmj0TB2D3INIP3jdr-v1koCrAupnAV7xVbelWCsc2BKra7ZQmkthS9LuGWrnL-klFCUykCxYG3Ff6gWNWZq-HZox9TjFMeB7ymcUpzO_A0H_KCehokfxrGrx18-p3jusevENIqemnjq-exT-k4xU-ZxxsfT9Elp4FWbYsA7dtNil2l10SU7PD8dNq9i9_6y3VQ7Eb2chAqFasi3BBrQI7ma6mAtuqKRQKUKIRCaJljjUTaEwXmy3riiBtNqCnrJHv5rIxEd5zU9pvPxcoz-A6NjWZI</recordid><startdate>201108</startdate><enddate>201108</enddate><creator>Coertze, J.</creator><creator>van Niekerk, J.</creator><creator>von Solms, R.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201108</creationdate><title>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</title><author>Coertze, J. ; van Niekerk, J. ; von Solms, R.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i90t-2c62de9fe131a9ae7bebc55a76d01e82cccea4dc549a0deac79e59476b14f3ec3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>automation</topic><topic>computer security</topic><topic>computer software</topic><topic>corporate governance</topic><topic>enterprise security</topic><topic>Guidelines</topic><topic>Information security</topic><topic>Information technology</topic><topic>IT governance</topic><topic>managing information security</topic><topic>methodologies for securing small/medium size enterprises</topic><topic>Organizations</topic><topic>security policy and procedures</topic><topic>Standards organizations</topic><toplevel>online_resources</toplevel><creatorcontrib>Coertze, J.</creatorcontrib><creatorcontrib>van Niekerk, J.</creatorcontrib><creatorcontrib>von Solms, R.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Coertze, J.</au><au>van Niekerk, J.</au><au>von Solms, R.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa</atitle><btitle>2011 Information Security for South Africa</btitle><stitle>ISSA</stitle><date>2011-08</date><risdate>2011</risdate><spage>1</spage><epage>8</epage><pages>1-8</pages><issn>2330-9881</issn><eisbn>9781457714832</eisbn><eisbn>1457714825</eisbn><eisbn>1457714833</eisbn><eisbn>9781457714825</eisbn><abstract>Many small-to-medium sized enterprises are finding it extremely difficult to implement proper information security governance due to cost implications. Due to this lack of resources, small enterprises are experiencing challenges in drafting information security policies as well as monitoring their implementation and compliance levels. This problem can be alleviated by means of a cost effective "dashboard system" and automated policy generation tool. This paper will critically evaluate an existing policy generation tool, known as the Information Security Management Toolbox, and will propose improvements to this existing system based on changes in both information security standards and business needs, since the development of the original system.</abstract><pub>IEEE</pub><doi>10.1109/ISSA.2011.6027515</doi><tpages>8</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 2330-9881
ispartof 2011 Information Security for South Africa, 2011, p.1-8
issn 2330-9881
language eng
recordid cdi_ieee_primary_6027515
source IEEE Xplore All Conference Series
subjects automation
computer security
computer software
corporate governance
enterprise security
Guidelines
Information security
Information technology
IT governance
managing information security
methodologies for securing small/medium size enterprises
Organizations
security policy and procedures
Standards organizations
title A web-based Information Security Management Toolbox for small-to-medium enterprises in Southern Africa
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-29T08%3A54%3A03IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=A%20web-based%20Information%20Security%20Management%20Toolbox%20for%20small-to-medium%20enterprises%20in%20Southern%20Africa&rft.btitle=2011%20Information%20Security%20for%20South%20Africa&rft.au=Coertze,%20J.&rft.date=2011-08&rft.spage=1&rft.epage=8&rft.pages=1-8&rft.issn=2330-9881&rft_id=info:doi/10.1109/ISSA.2011.6027515&rft.eisbn=9781457714832&rft.eisbn_list=1457714825&rft.eisbn_list=1457714833&rft.eisbn_list=9781457714825&rft_dat=%3Cieee_CHZPO%3E6027515%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i90t-2c62de9fe131a9ae7bebc55a76d01e82cccea4dc549a0deac79e59476b14f3ec3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6027515&rfr_iscdi=true