Multimedia Information Security Architecture Framework

This paper presents a state-of-the-art overview of distinguishable approaches, overview of some writings that have themes and a similar discussion, with the background to provide an overview to the readers of control and things related to multimedia information security, all attempting to define multimedia information security architecture, followed by a proposition of requirements for multimedia integrated security architecture. There is no standardized and comprehensive of multimedia information security architecture currently exists. Multimedia information security as part of Information security has holistic approach towards the implementation of information security by introducing the concept and model of multimedia security architecture.

[1]  Mikko T. Siponen,et al.  Information security management standards: Problems and solutions , 2009, Inf. Manag..

[2]  Denis Trèek,et al.  An integral framework for information systems security management , 2003, Comput. Secur..

[3]  Hennie A. Kruger,et al.  A prototype for assessing information security awareness , 2006, Comput. Secur..

[4]  Sebastiaan H. von Solms,et al.  Information Security Governance - Compliance management vs operational management , 2005, Comput. Secur..

[5]  Rossouw von Solms,et al.  Information security governance: Due care , 2006, Comput. Secur..

[6]  Evangelos A. Kiountouzis,et al.  Information systems security policies: a contextual perspective , 2005, Comput. Secur..

[7]  Debi Ashenden,et al.  Information Security management: A human challenge? , 2008, Inf. Secur. Tech. Rep..

[8]  Jan H. P. Eloff,et al.  Information security architecture , 2005 .

[9]  Kwo-Jean Farn,et al.  Paper: a study on the certification of the information security management systems , 2003, Comput. Stand. Interfaces.

[10]  Jan H. P. Eloff,et al.  A framework and assessment instrument for information security culture , 2010, Comput. Secur..

[11]  Thomas Finne,et al.  A conceptual framework for information security management , 1998, Comput. Secur..

[12]  Rossouw von Solms,et al.  The 10 deadly sins of information security management , 2004, Comput. Secur..

[13]  Eugene H. Spafford,et al.  PFIRES: a policy framework for information security , 2003, CACM.

[14]  Kwo-Jean Farn,et al.  A study on information security management system evaluation - assets, threat and vulnerability , 2004, Comput. Stand. Interfaces.

[15]  Sebastiaan H. von Solms,et al.  Information Security governance: COBIT or ISO 17799 or both? , 2005, Comput. Secur..

[16]  XI. REFERENCES , 1966, Carbanion Chemistry.

[17]  Sebastiaan H. von Solms,et al.  Information Security - A Multidimensional Discipline , 2001, Comput. Secur..