Considerations on the implementation steps for an information security management system
News about various information security attacks against companies appears almost every day. The sources of these attacks vary from cyber-criminals who want to steal companies’ data to demand a ransom, to current or former employees who want to create damage to the organization. The best way to defen...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Sciendo
2018-05-01
|
Series: | Proceedings of the International Conference on Business Excellence |
Subjects: | |
Online Access: | https://doi.org/10.2478/picbe-2018-0043 |