Research Article
Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology
Table 13
Comparisons between traditional ISMS and proposed ISMS.
| Item | Approach | Traditional ISMS | Proposed ISMS |
| Management approach | Passive | Active | System management | More complicated | More convenient | Strictness of security | Loose | Strict | Permission management | Complex | Simple | Audit trail setting | To be set in different monitoring devices | Simply define needed control items as per roles | Licensed count of equipment | Unable to effectively control | Able to use limited number of licenses in required control |
|
|