UJDigispace Repository

An analysis of information security governance models

Show simple item record

dc.contributor.advisor Mrs. Vanessa van Dyk en_US
dc.contributor.author Sibanda, Mbusi
dc.date.accessioned 2012-06-06T08:13:06Z
dc.date.available 2012-06-06T08:13:06Z
dc.date.issued 2012-06-06
dc.date.submitted 2012-03-22
dc.identifier.uri http://hdl.handle.net/10210/4947
dc.description M.Comm. en_US
dc.description.abstract This study will point out the need for information security governance. Since the risk that a specific information security incident will occur is not always obvious, it is difficult for an organisation to invest time and money in information security governance. An information security governance model should therefore be extensive enough to include all possible security scenarios. This should enable any implementing organisation to prevent or indirectly intervene in the occurrence of security-related incidents within its perimeters. An analysis of the existing models will be conducted and will combine drivers from the corporate governance, information technology governance and information security governance disciplines. It can be expected that the information security governance model will inherit a number of the respective best practice and related documents’ benefits and advantages. These inherited benefits add enormous value to both the best practice model and the information security governance discipline. en_US
dc.language.iso en en_US
dc.subject Information security governance en_US
dc.subject Computer networks security en_US
dc.subject Data protection en_US
dc.title An analysis of information security governance models en_US
dc.type Thesis en_US

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search UJDigispace


My Account