Information system access control

Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that...

Full description

Bibliographic Details
Main Author: Весна Алексић-Марић, PhD
Format: Article
Language:English
Published: University of Banja Luka, Faculty of Economics 2006-12-01
Series:Acta Economica
Subjects:
Online Access:http://ae.ef.unibl.org/index.php/AE/article/view/310
id doaj-6f9f6804da6d4dbe87020af3281bdcbd
record_format Article
spelling doaj-6f9f6804da6d4dbe87020af3281bdcbd2020-11-25T01:31:22ZengUniversity of Banja Luka, Faculty of Economics Acta Economica1512-858X2232-738X2006-12-0145Information system access controlВесна Алексић-Марић, PhD0Faculty of Economics, University of Banja Luka Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation. http://ae.ef.unibl.org/index.php/AE/article/view/310information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards.
collection DOAJ
language English
format Article
sources DOAJ
author Весна Алексић-Марић, PhD
spellingShingle Весна Алексић-Марић, PhD
Information system access control
Acta Economica
information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards.
author_facet Весна Алексић-Марић, PhD
author_sort Весна Алексић-Марић, PhD
title Information system access control
title_short Information system access control
title_full Information system access control
title_fullStr Information system access control
title_full_unstemmed Information system access control
title_sort information system access control
publisher University of Banja Luka, Faculty of Economics
series Acta Economica
issn 1512-858X
2232-738X
publishDate 2006-12-01
description Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation.
topic information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards.
url http://ae.ef.unibl.org/index.php/AE/article/view/310
work_keys_str_mv AT vesnaaleksićmarićphd informationsystemaccesscontrol
_version_ 1725086984155693056