z-logo
open-access-imgOpen Access
MAIN APPROACHES TO FORMATION OF SECURITY POLICY
Author(s) -
Cheynesh Oyun,
Evgenij Popantonopulo,
Igor N. Karmanov
Publication year - 2019
Publication title -
interèkspo geo-sibirʹ
Language(s) - English
Resource type - Journals
ISSN - 2618-981X
DOI - 10.33764/2618-981x-2019-6-2-3-7
Subject(s) - security policy , relevance (law) , network security policy , information security standards , key (lock) , security convergence , information security , process (computing) , computer security model , computer security , computer science , business , security service , political science , law , operating system
In the article the relevance of information security policy development at an enterprise is shown, key definitions of security policy are given. The main functions and standards in the field of security policy are highlighted, the consequences of absence or poorly developing of security policy are formulated, two approaches to the formation of security policy are signed, and the topic of automating the process of developing of a basic or general security policy for an enterprise is disclosed.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here