DSpace Repository

'n Strategiese bestuursbenadering tot sekuriteit en beheer binne 'n komplekse gerekenariseerde inligtingstelselomgewing

Show simple item record

dc.contributor.author Bezuidenhout RJ en
dc.date.accessioned 2016-09-22T07:15:58Z
dc.date.available 2016-09-22T07:15:58Z
dc.date.created 1986 en
dc.date.submitted 1988 en
dc.identifier.uri http://hdl.handle.net/20.500.11892/9212
dc.description.abstract To achieve the objectives of a total computer security implementation, it is firstly essential to identify the problems and factors (for example risks, threats and exposures) that might have an impact on computer security and control. Secondly it is necessary, to define and understand computer security and control elements. Thirdly it is important to assess the current situation of computer security and control and to provide and implementation methodology to cover and enhance areas for improvement. Fourthly a strategic process approach is suggested in this study, to enable management to: establish the current strategy and mission in respect of computer security; define and analyse the current environmental profile; identify and describe scenario's; analyse strengths/weaknesses and opportunities/threats; analyse resources available to the organization to meet the future demands; formulate strategic issues, i.e. to take the organization where it wants to be; verify and match the current position and desired future situation by means of a gap analysis; formulate a strategic approach and guidelines for implementing gap analysis components, after alternative setting and evaluation and finalize action plans to cater for all strategic issues and specify responsibility, deliverables and target dates. In the last instance it is necessary to introduce an implementation methodology, consisting of: management commitment and -involvement; computer security committee and task force establishment; computer security scope setting; strategic/functional process implementation; computer security awareness program; computer security training program and maintenance and monitor mechanism implementation for an ongoing basis evaluation. As the proliferation and increased use of computers becomes a reality, the dependence and reliance on computer information processing will become more important, the need for effective and efficient computer security and control will grow and computer security and control will become more complex. en
dc.language Afrikaans en
dc.subject Business administration / Business leadership en
dc.subject Business management and policy en
dc.title 'n Strategiese bestuursbenadering tot sekuriteit en beheer binne 'n komplekse gerekenariseerde inligtingstelselomgewing en
dc.type Masters degree en
dc.description.degree MBA en

Files in this item

Files Size Format View

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record