Analysis of factors that inhibiting implementation of Information Security Management System (ISMS) based on ISO 27001

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System

Established standards on security and risk management provide guidelines and advice to organizations and other stakeholders on how to fulfill their security needs. However, realizing and ensuring compliance with such standards may be challenging. This is partly because the descriptions are very generic and have to be refined and interpreted by security experts, and partly because they lack tech...

متن کامل

ISO / IEC 27001 Implementation

The International Organization for Standardization (ISO) is an international organization that sets standards which provide measurable quality to products and services which, if implemented correctly, should increase reliability and operational efficiency. ISO established several IT standards, one of which is ISO/IEC27001:2005 Information Security Management System (ISO27001), providing securit...

متن کامل

ISO/IEC 27000, 27001 and 27002 for Information Security Management

With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognize...

متن کامل

Standardization of Information Security Management System: ISO/IEC 27001: 2005, ITIL®, CoBIT®

Information is currently the most important asset of modern companies. Its security is therefore very important and becomes the top priority of each company. Unfortunately, there is no simple recipe providing 100 % security of information. A company must apply the best security procedures with the aim to achieve an appropriate level of its information security. This paper presents and compares ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Physics: Conference Series

سال: 2018

ISSN: 1742-6588,1742-6596

DOI: 10.1088/1742-6596/978/1/012039