Research Article
Enterprise Information Security Management Based on Context-Aware RBAC and Communication Monitoring Technology
Table 13
Comparisons between traditional ISMS and proposed ISMS.
| | Item | Approach | | Traditional ISMS | Proposed ISMS |
| | Management approach | Passive | Active | | System management | More complicated | More convenient | | Strictness of security | Loose | Strict | | Permission management | Complex | Simple | | Audit trail setting | To be set in different monitoring devices | Simply define needed control items as per roles | | Licensed count of equipment | Unable to effectively control | Able to use limited number of licenses in required control |
|
|