INFORMATION SYSTEM ACCESS CONTROL Cover Image

Контрола приступа информационом систему
INFORMATION SYSTEM ACCESS CONTROL

Author(s): Vesna Aleksić-Marić
Subject(s): Media studies, Supranational / Global Economy, Business Economy / Management, Electronic information storage and retrieval, ICT Information and Communications Technologies, Socio-Economic Research
Published by: Економски факултет Универзитета у Бањој Луци
Keywords: information system; cryptography; Personal Identification Number (PIN); digital signature; smart cards;

Summary/Abstract: Considering the existing situation and indicators pointing to the problems or the inadequacy of some solutions in the system security, research involving a variety of questions has bee conducted. Contemporary business process design means, however, that it is in previous phases of the project that secure information technology (IT) is to be taken into account, the one which does not only support business process but may transform it radically. The main mottoes of the business process reengineering are the secure communication, which ought to provide interface top-down theory bottom-up implementation. This paper covers security planning, security policy definition, procedures and recommendation for implementation of security policy. It also deals with security testing and continuous monitoring of security related events (locally and globally) as well as with updating of security policy and its technical implementation.

  • Issue Year: 4/2006
  • Issue No: 5
  • Page Range: 131-151
  • Page Count: 21
  • Language: Bosnian, Croatian, Serbian