A model for the development of an organization's information system (IS) security system
Boyce, Joseph George
Fremgen, James M.
Spencer, Michael P.
MetadataShow full item record
This thesis addresses the development of a system to secure appropriately an organization from some discernible threats posed by the presence, power, and applications of its computers. It presents a conceptual definitional framework for an information system (IS) security system. This framework consists of the system's objectives environment; resources; components (tasks); and management. A generic development model is established to construct a security system within this framework. The model consists of planning, design, and implementation (installation, testing, and management) phases. Conclusions are drawn which present the continuing need for such a development process within an organization. The development model is considered sufficient enough to serve as a basis for the performance of security system developments within a broad range of organizations.
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2011);10 Years After: the 9/11 Essays. Homeland Security Affairs (HSA) is pleased to present this special collection of essays in remembrance of the ten-year anniversary of September 11, 2001. We chose to honor those who lost ...
Russell, James A.; Wirtz, Jim (Monterey, California: Naval Postgraduate SchoolMonterey, California. Naval Postgraduate School, 2019-12); NPS-19-N001-AThis project is a continuation of ongoing support by NPS to the work of N50 to further refining and improving the Navy's strategy development and implementation processes. This will be the fourth year of support to the ...
Brown, Thomas L. (Monterey, California. Naval Postgraduate School, 1992-09);In recent years, computer networks have significantly increased in both complexity and number, and these networks are attractive targets for attack and intrusion. Unix networks being managed by the government and providing ...