Enterprise Information System Security: A Life-Cycle Approach

Enterprise Information System Security: A Life-Cycle Approach

Chandan Mazumdar
ISBN13: 9781605661322|ISBN10: 1605661325|EISBN13: 9781605661339
DOI: 10.4018/978-1-60566-132-2.ch007
Cite Chapter Cite Chapter

MLA

Mazumdar, Chandan. "Enterprise Information System Security: A Life-Cycle Approach." Handbook of Research on Social and Organizational Liabilities in Information Security, edited by Manish Gupta and Raj Sharman, IGI Global, 2009, pp. 118-132. https://doi.org/10.4018/978-1-60566-132-2.ch007

APA

Mazumdar, C. (2009). Enterprise Information System Security: A Life-Cycle Approach. In M. Gupta & R. Sharman (Eds.), Handbook of Research on Social and Organizational Liabilities in Information Security (pp. 118-132). IGI Global. https://doi.org/10.4018/978-1-60566-132-2.ch007

Chicago

Mazumdar, Chandan. "Enterprise Information System Security: A Life-Cycle Approach." In Handbook of Research on Social and Organizational Liabilities in Information Security, edited by Manish Gupta and Raj Sharman, 118-132. Hershey, PA: IGI Global, 2009. https://doi.org/10.4018/978-1-60566-132-2.ch007

Export Reference

Mendeley
Favorite

Abstract

There has been an unprecedented thrust in employing Computers and Communication technologies in all walks of life. The systems enabled by Information Technology are becoming more and more complex resulting in various threats and vulnerabilities. The security properties, like confidentiality, integrity, and availability, are becoming more and more difficult to protect. In this chapter, a life-cycle approach to achieve and maintain security of enterprises has been proposed. First, enterprise information systems are looked at in detail. Then, the need for enterprise information system security and problems associated with security implementation are discussed. The authors consider enterprise information system security as a management issue and detail the information security parameters. Finally, the proposed security engineering life-cycle is described in detail, which includes, Security Requirement Analysis, Security Policy Formulation, Security Infrastructure Advisory Generation, Security Testing and Validation, and Review and Monitoring phases.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.