Considerations on the implementation steps for an information security management system

News about various information security attacks against companies appears almost every day. The sources of these attacks vary from cyber-criminals who want to steal companies’ data to demand a ransom, to current or former employees who want to create damage to the organization. The best way to defen...

Full description

Bibliographic Details
Main Authors: Ionescu Răzvan Cristian, Ceaușu Ioana, Ilie Cristian
Format: Article
Language:English
Published: Sciendo 2018-05-01
Series:Proceedings of the International Conference on Business Excellence
Subjects:
Online Access:https://doi.org/10.2478/picbe-2018-0043