Information system access control
Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that...
Main Author: | |
---|---|
Format: | Article |
Language: | English |
Published: |
University of Banja Luka, Faculty of Economics
2006-12-01
|
Series: | Acta Economica |
Subjects: | |
Online Access: | http://ae.ef.unibl.org/index.php/AE/article/view/310 |
id |
doaj-6f9f6804da6d4dbe87020af3281bdcbd |
---|---|
record_format |
Article |
spelling |
doaj-6f9f6804da6d4dbe87020af3281bdcbd2020-11-25T01:31:22ZengUniversity of Banja Luka, Faculty of Economics Acta Economica1512-858X2232-738X2006-12-0145Information system access controlВесна Алексић-Марић, PhD0Faculty of Economics, University of Banja Luka Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation. http://ae.ef.unibl.org/index.php/AE/article/view/310information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards. |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
Весна Алексић-Марић, PhD |
spellingShingle |
Весна Алексић-Марић, PhD Information system access control Acta Economica information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards. |
author_facet |
Весна Алексић-Марић, PhD |
author_sort |
Весна Алексић-Марић, PhD |
title |
Information system access control |
title_short |
Information system access control |
title_full |
Information system access control |
title_fullStr |
Information system access control |
title_full_unstemmed |
Information system access control |
title_sort |
information system access control |
publisher |
University of Banja Luka, Faculty of Economics |
series |
Acta Economica |
issn |
1512-858X 2232-738X |
publishDate |
2006-12-01 |
description |
Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation.
|
topic |
information system, cryptography, Personal Identification Number (PIN), digital signature, smart cards. |
url |
http://ae.ef.unibl.org/index.php/AE/article/view/310 |
work_keys_str_mv |
AT vesnaaleksićmarićphd informationsystemaccesscontrol |
_version_ |
1725086984155693056 |