Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Security Assessment

Handbook of Research on ICTs and Management Systems for Improving Efficiency in Healthcare and Social Care
Its objective is to give the organization a fundamental understanding of its security posture as a whole in a set of key areas; an in-depth security assessment may be faced as a comprehensive study of the security of an organization, including an examination of all policies, procedures, hardware and software configurations, users, workstations, servers, Websites and mail servers; it is a comprehensive analysis of an organization’s network computing systems with an emphasis on security and the organization's compliance with relevant standards and controls.
Published in Chapter:
Maturity and Metrics in Health Organizations Information Systems
Alberto Carneiro (Universidade Autónoma de Lisboa (CESITI), Portugal)
DOI: 10.4018/978-1-4666-3990-4.ch049
Abstract
This chapter discusses the issues and choices that researchers and technicians should consider when adapting maturity models to healthcare organizations needs. It discusses the practical utilization of maturity models, including different maners of exploring a model’s usefulness. For a more complete understanding of maturity models and their applicability, the selection of criteria and processes of measurement, called metrics, is briefly reviewed in terms of indicators and daily procedures. Finally, some issues of management information systems security are briefly addressed, along with a note on measuring security assessment.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Maturity and Metrics in Health Organizations Information Systems
Its objective is to give the organization a fundamental understanding of its security posture as a whole in a set of key areas; an in-depth security assessment may be faced as a comprehensive study of the security of an organization, including an examination of all policies, procedures, hardware and software configurations, users, workstations, servers, Websites and mail servers; it is a comprehensive analysis of an organization’s network computing systems with an emphasis on security and the organization’s compliance with relevant standards and controls.
Full Text Chapter Download: US $37.50 Add to Cart
Information Portal Strategy for Transportation Security Management
Proactive measure to identify and nullify potential security breaches and threats before the terrorists invade transportation systems.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR