Information Security Challenge and Breaches: Novelty Approach on Measuring ISO 27001 Readiness Level
نویسندگان
چکیده
Information security challenges and breaches increasing time by time lead practitioners and experts solving that‟s problems. Compliance with information security standards be highly recommended to ensure all information be safe since securing information system resources is extremely important to ensure that the resources are well protected. Information security is not just a simple matter of having usernames and passwords. Actually Information security becomes a very important part for the organization‟s intangible assets, level of confidence and stakeholder trusted are performance indicator as successes organization. This paper will discuss the challenges and breaches in information security, we refer several surveys in the field of information security as secondary data, such as information security breaches survey and global state of information security survey, that lead us offer a framework (called by integrated solution framework, i-solution framework) for understanding information security management standards (ISMS) term and concept and also we implement it into application software on assessing readiness level of an organization toward the implementation of information security standard, ISO27001.
منابع مشابه
A Novel Method on ISO 27001 Reviews: ISMS Compliance Readiness Level Measurement
Security is a hot issue to be discussed, ranging from business activities, correspondence, banking and financial activities; it requires prudence and high precision. Since information security has a very important role in supporting activities of the organization, we need a standard or benchmark which regulates governance over information security. The main objective of this paper is to impleme...
متن کاملISO/IEC 27000, 27001 and 27002 for Information Security Management
With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognize...
متن کاملOntology-Based Evaluation of ISO 27001
Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to guide security managers in their endeavors. H...
متن کاملIntegrated Solution Modeling Software: A New Paradigm on Information Security Review and Assessment
Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...
متن کاملIntegrated Solution Modeling Software: A New Paradigm on Information Security Review
Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...
متن کامل