Background Objectives: With new and innovative technologies such as Cloud, Remote computing, Enterprise Mobility, e-commerce on the rise, network security has remained an ever increasing challenge. ![]() ![]() This paper proposes bridging the gap between the high level information security policy descriptions with the low level network infrastructure security implementation. This leads to the critical need for the designing an empirically tested, comprehensive security policy design. This results in blurred outlines for monitoring, evaluation and enforcement of the security policy for the employees causing confusion in adhering and implementing it which leads to lack of process of publishing form the security policy, end user awareness, translation of high level policy to lowest level component configuration plans and actions to take in time of crisis. The information security policy development lifecycle tend to lack focus on use of standard terms and semantics.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |