Information security management for higher education institutions

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Citations (Scopus)

Abstract

Information security aims at protecting the information assets of an organization from any unauthorized access, disclosure and destruction. For information security to be effectively enforced, good management practices comprising policies and controls should be established. This paper investigates the information security management for higher education institutions. Based on the conventional CIA (confidentiality, integrity and availability) triad of information, eight control areas on information security are identified. They include information asset controls, personnel controls, physical controls, access controls, communication controls, operation controls, information system controls, and incident management and business continuity. A governance framework is important for establishing the policies and executing the controls of information security. It is necessary to maintain a right balance between the technical feasibility and the flexibility and efficiency in administration.

Original languageEnglish
Title of host publicationIntelligent Data Analysis and Its Applications - the 1st Euro-China Conference on Intelligent Data Analysis and Applications, Proceeding
EditorsVaclav Snasel, Ajith Abraham, Emilio S. Corchado, Shyue-Liang Wang, Jeng-Shyang Pan, Jeng-Shyang Pan
Pages11-19
Number of pages9
ISBN (Electronic)9783319077758
DOIs
Publication statusPublished - 2014
Event1st Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2014 - Shenzhen, China
Duration: 13 Jun 201415 Jun 2014

Publication series

NameAdvances in Intelligent Systems and Computing
Volume297
ISSN (Print)2194-5357

Conference

Conference1st Euro-China Conference on Intelligent Data Analysis and Applications, ECC 2014
Country/TerritoryChina
CityShenzhen
Period13/06/1415/06/14

Keywords

  • Information security controls
  • Information security management
  • Information security policies

Fingerprint

Dive into the research topics of 'Information security management for higher education institutions'. Together they form a unique fingerprint.

Cite this