A Review on Information Security Program Development and Management

M. Thangavel, D. K. Sri Subarnaa, P. Deepa, E. Sharon Blessie

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

For any business or organization to endure and compete with other businesses, they need to invest in what is called "Information Technology", which guarantees data availability, integrity, and confidentiality. However, with the increase of internal and peripheral threats, the IT system of a business could be exposed to potential risks. This is the main reasons for choosing the importance of providing security and risk management for sustainable businesses organization. In this paper it will provide some security measure and risk management procedures in order to prevent the organization from the many attacks, it is essential for the information security manager to have a broad knowledge about the current and upcoming technology, system and risk are available in the local domain.

Original languageEnglish
Title of host publication2018 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2018
EditorsN. Krishnan, M. Karthikeyan
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781538615072
DOIs
Publication statusPublished - Dec 2018
Externally publishedYes
Event9th IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2018 - Madurai, India
Duration: Dec 13 2018Dec 15 2018

Publication series

Name2018 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2018

Conference

Conference9th IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2018
Country/TerritoryIndia
CityMadurai
Period12/13/1812/15/18

Keywords

  • Governance
  • Risk Management
  • Security Program

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Networks and Communications
  • Computer Science Applications
  • Information Systems
  • Information Systems and Management
  • Health Informatics

Fingerprint

Dive into the research topics of 'A Review on Information Security Program Development and Management'. Together they form a unique fingerprint.

Cite this