Advanced Search
MyIDEAS: Login to save this article or follow this journal

Architecture and infrastructure for governing information security in central banks

Contents:

Author Info

  • Kemal Hajdarevic

    ()
    (Information Security Manager, Governor’s office, Central Bank of Bosnia and Herzegovina)

  • Kemal Kozaric

    ()
    (Governor of the Central Bank of Bosnia and Herzegovina and a professor at the Faculty of Economics in Sarajevo)

  • Jasmin Hadzigrahic

    ()
    (Senior Specialist for Applications Design and Maintenance, IT Department, Central Bank of Bosnia and Herzegovina)

Registered author(s):

    Abstract

    Everyday news reports reveal incidents and even largescale scandals in the business world related to improper information security handling. Despite available and existing relevant information security standards, incidents which could lead to real problems were not proactively prevented for numerous of reasons. One of the first and most important reasons was not implemented and observed relevant information security standards such as ISO 27001. This standard defines requirements for an organisation’s Information Security Management System (ISMS). Implementation of the ISMS is only the tip of the iceberg in managing information security since all system parts have to be well monitored and adjusted to prevent or minimize security risks. This process of monitoring and upgrading takes most of the resources dedicated to every ISMS. Standard such as ISO 27004:2009 which defines what has to be monitored also belongs to ISO 2700 series of standards. The ISO 27004:2009 standard does not define how measurement has to be done by using a specific kind of architecture and infrastructure for the Key Performance Indicator (KPI) measurement and monitoring. In this paper is presented holistic approach for implementing architecture and infrastructure to collect, analyse, and present information security KPIs, in order to achieve constant improvements of the ISMS. The same approach could be used for other business activities as well in central banks or other organisations.

    Download Info

    If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
    File URL: http://www.cbcg.me/repec/cbk/journl/vol1no2-1.pdf
    Download Restriction: no

    Bibliographic Info

    Article provided by Central bank of Montenegro in its journal Journal of Central banking Theory and Practice.

    Volume (Year): 1 (2012)
    Issue (Month): 2 ()
    Pages: 5-17

    as in new window
    Handle: RePEc:cbk:journl:v:1:y:2012:i:2:p:5-17

    Contact details of provider:
    Postal: Bulevar Svetog Petra Cetinjskog br. 6, 81000 Podgorica
    Phone: +382 20 403 136
    Fax: +382 20 664 029
    Email:
    Web page: http://www.cbcg.me/eng/index.php?bl=journal
    More information through EDIRC

    Related research

    Keywords: Information Security; KPI; measurement;

    Find related papers by JEL classification:

    References

    No references listed on IDEAS
    You can help add them by filling out this form.

    Citations

    Lists

    This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.

    Statistics

    Access and download statistics

    Corrections

    When requesting a correction, please mention this item's handle: RePEc:cbk:journl:v:1:y:2012:i:2:p:5-17. See general information about how to correct material in RePEc.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ().

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If references are entirely missing, you can add them using this form.

    If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.