American Universities Information Security Management System and Enlightenment

Article Preview

Abstract:

American universities information security management system mostly established a special and independent information security management. Management system establishes the most CI0 management system, perfects the organizational structure and management content, which emphasis on differences, but the content covering were roughly the same. Enlightenment is as follows: first, we must establish independent information security management department. Second, we must be standardized, information security management content; Third, we must be installed with the professional information security work team.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1046-1049

Citation:

Online since:

February 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Von Solms, SH. Information Security - The Third Wave [J]. Computers and Security, 2000, 19(7) : 615-620.

DOI: 10.1016/s0167-4048(00)07021-8

Google Scholar

[2] The Campus Computing project, The 2006 Campus Computing Survey 2006 [EB /0L], (2006-10)[2008-6]. http: /www. campuscomputing. net/summaries/2006/index. html.

Google Scholar

[3] CNCERT. In the first half of 2006 network security report [EB / 0L]. (2007-1-31) [2007-3-7]. http: /www. cert. Org. Cn/articles/docs/common / 2007013163191. shtml.

Google Scholar

[4] The University of Texas at Dallas information Security Office. Information SecurityPolicies[EB/0L]. (2007-11)[2008-4]. http: /www. utdallas. edu/ir/security/Policies. htm.

Google Scholar

[5] ZhaoGuoDong. The information age university: American higher education informatization development and enlightenment[J]. journal of modern education technology, 2003 (5).

Google Scholar

[6] Wu Haiyan, Miao Chunyu, Jiang Dongxing. American universities information security management situation analysis and enlightenment [J]. Laboratory technology and management, 2009 (5).

Google Scholar