Information Security Governance

  • S.H. Solms
  • Rossouw Solms

Table of contents

  1. Front Matter
    Pages 1-12
  2. S.H. von Solms, R von Solms
    Pages 1-7
  3. S.H. von Solms, R von Solms
    Pages 1-7
  4. S.H. von Solms, R von Solms
    Pages 1-11
  5. S.H. von Solms, R von Solms
    Pages 1-10
  6. S.H. von Solms, R von Solms
    Pages 1-14
  7. S.H. von Solms, R von Solms
    Pages 1-11
  8. S.H. von Solms, R von Solms
    Pages 1-14
  9. Back Matter
    Pages 1-4

About this book

Introduction

IT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry.

Key Features:

  • The book provides a point of entry into the subject with an easy-to-understand model of Information Security Governance
  • Book addresses information security from the governance side, with special emphasis on the accountability of top management
  • Ideal for the professional market as it discusses some international best practices for IT Security Governance in detail

Keywords

COBIT Compliance Compliance Management Corporate Governance Governance IT IT security Information Information Security Managment Management architecture data security information security information technology security

Authors and affiliations

  • S.H. Solms
    • 1
  • Rossouw Solms
    • 2
  1. 1.Dept. Computer ScienceRand Afrikaans UniversityJohannnesburgSouth Africa
  2. 2.Port ElizabethSouth Africa

Bibliographic information

  • DOI https://doi.org/10.1007/978-0-387-79984-1
  • Copyright Information Springer Science+Business Media, LLC 2009
  • Publisher Name Springer, Boston, MA
  • eBook Packages Computer Science
  • Print ISBN 978-0-387-79983-4
  • Online ISBN 978-0-387-79984-1
  • About this book