Examining the critical measures in addressing information systems security breaches.

This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) fr...

Full description

Saved in:
Bibliographic Details
Main Authors: Chan, Shijia., Kong, Sandra Shuhua., Teo, Yixin.
Other Authors: Yao, Lee Jian
Format: Final Year Project
Published: 2008
Subjects:
Online Access:http://hdl.handle.net/10356/9358
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Nanyang Technological University
Description
Summary:This study is built on the twin research papers of Chan and Yao (2003), which address issues regarding corporate security policy, systems security audits, and hackers’ behavior. In light of budgetary constraints, our findings show that when firms implement an Information Security Management (ISM) framework, which consists of laying the foundation with a Corporate Security Policy (CSP) and subsequently using systems security audits as its feedback function, firms are able to successfully deter internal party attacks.