Information system access control

Journal Title: Acta Economica - Year 2006, Vol 4, Issue 5

Abstract

Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation.

Authors and Affiliations

Весна Алексић-Марић, PhD

Keywords

Related Articles

THE ROLE OF DYNAMIC EFFICIENCY GRADING METHODS IN INVESTMENT DECISION MAKING

When determining the justification of an investment project realization, it is necessary to conduct an analysis and measurement of the effects obtained from investment projects. Measuring of the effects is done by calcul...

Moral hazard in the banking sector of Republika Srpska

Many previous crisis in the banking sector showed that moral hazard is often one of the main causes of such crises. Failure of two banks in Republika Srpska in a very short period of time gave rise to this study to deter...

ROLE OF DEPOSIT INSURANCE IN ORDER TO OVERCOME THE BANKING CRISIS

Any economic and banking crisis in the world has generated a deep and long-term disorders system or nonsystem characters at the core of a certain economic and banking system. Generally looking, the periods of crisis are...

The impact of austerity measures on economic growth in the Eurozone

have a more severe compliance of the Maastricht fiscal criteria. Requirements for implementation of austerity measures are contradictory to the Keynesian central preposition which says that the right time for austerity i...

THE EURO AND CURRENT FINANCIAL CRISIS

This article discusses the issues related to the European single currency in the context of the current global financial crisis. The paper gives an overview on the process and strategy for transition to the European Mone...

Download PDF file
  • EP ID EP43604
  • DOI -
  • Views 289
  • Downloads 0

How To Cite

Весна Алексић-Марић, PhD (2006). Information system access control. Acta Economica, 4(5), -. https://www.europub.co.uk/articles/-A-43604