Abstract

ABSTRACT The Information Systems Security Policy reflects the Management’s expectations and requirements concerning the Information System. It shall take account, at a minimum, of the needs relating to the availability, confidentiality, and privacy of the software and data used and exchanged on networks and systems and shall consolidate a collection of scientific, operational, legal and human security rules and standards to ensure an efficient and homogeneous level of security. The paper aims to examine what controls are widely used and how they are implemented in the Middle East and North Africa MENA area to apply a realistic information management strategy in large public organizations. The finding will assist in adopting an efficient information security policy.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call