Architecture and infrastructure for governing information security in central banks
Everyday news reports reveal incidents and even largescale scandals in the business world related to improper information security handling. Despite available and existing relevant information security standards, incidents which could lead to real problems were not proactively prevented for numerous of reasons. One of the first and most important reasons was not implemented and observed relevant information security standards such as ISO 27001. This standard defines requirements for an organisation’s Information Security Management System (ISMS). Implementation of the ISMS is only the tip of the iceberg in managing information security since all system parts have to be well monitored and adjusted to prevent or minimize security risks. This process of monitoring and upgrading takes most of the resources dedicated to every ISMS. Standard such as ISO 27004:2009 which defines what has to be monitored also belongs to ISO 2700 series of standards. The ISO 27004:2009 standard does not define how measurement has to be done by using a specific kind of architecture and infrastructure for the Key Performance Indicator (KPI) measurement and monitoring. In this paper is presented holistic approach for implementing architecture and infrastructure to collect, analyse, and present information security KPIs, in order to achieve constant improvements of the ISMS. The same approach could be used for other business activities as well in central banks or other organisations.
Volume (Year): 1 (2012)
Issue (Month): 2 ()
|Contact details of provider:|| Postal: |
Phone: +382 20 403 136
Fax: +382 20 664 029
Web page: http://www.cbcg.me/eng/index.php?bl=journal
More information through EDIRC
When requesting a correction, please mention this item's handle: RePEc:cbk:journl:v:1:y:2012:i:2:p:5-17. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: ()The email address of this maintainer does not seem to be valid anymore. Please ask to update the entry or send us the correct address
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services.