Research Article

Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology

Table 13

Comparisons between traditional ISMS and proposed ISMS.

ItemApproach
Traditional ISMSProposed ISMS

Management approachPassiveActive
System managementMore complicatedMore convenient
Strictness of securityLooseStrict
Permission managementComplexSimple
Audit trail settingTo be set in different monitoring devicesSimply define needed control items as per roles
Licensed count of equipmentUnable to effectively controlAble to use limited number of licenses in required control