Influence of Iso 27001:2005 on the Port of Rijeka Security

نویسنده

  • Bojan Hlača
چکیده

The purpose of this paper is to explain clearly the role of the information system security management within the entire Port of Rijeka security process. The complexity of the Port of Rijeka system, in which Rijeka Port Authority contemplates the development strategy of the Rijeka traffic route and the services provided by the Port within the framework of the already existing development paradigm of the information-communication system, is elaborated. Within the management of the information-communication resources, one of the basic prerequisites for a success is the information security, or the protection of the information security management system. Therefore, the ISO 27001:2005 Certificate, which deals with the information security system management, is to be considered in the scope defined by the organization itself. While studying the advantages of the ISO 27001:2005 Certificate, the characteristics of Rijeka Port Authority are defined, the contents of the Certificate itself are explained and the possible comparative advantages that can be obtained within the broader framework of the port security process are stated.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Getting the Full Benefits of the ISO 27001 to Develop an ISMS based on Organisations’ InfoSec Culture

The ISO/IEC 27001 is an important and the most leading international information security management standard in the information security (InfoSec) world. The benefits of implementing the ISO 27001 are to provide market assurance and IT governance, based on customer demands and legal requirements. Although the ISO 27001 is a generic standard for all types of organisations and countries, there a...

متن کامل

Analysis of the User Acceptance for Implementing ISO/IEC 27001:2005 in Turkish Public Organizations

This study aims to develop a model for the user acceptance for implementing the information security standard (i.e. ISO 27001) in Turkish public organizations. The results of the surveys performed in Turkey reveal that the legislation on information security public which organizations have to obey is significantly related with the user acceptance during ISO 27001 implementation process. The fun...

متن کامل

Governing Information Security in Conjunction with COBIT and ISO 27001

In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS

متن کامل

Refinement of Strategy and Technology Domains STOPE View on ISO 27001

It is imperative for organizations to use Information Security Management System (ISMS) to effectively manage their information assets. ISMS starts with a set of policies that dictate the usage of computer resources. It starts with the “21 essential security controls” of ISO 27001, which give the basic standard requirements of information security management. Our research is concerned with the ...

متن کامل

Ontology-Based Evaluation of ISO 27001

Information security risks threaten the ability of organizations of reaching their operational and strategic goals. Increasing diversification of the information security landscapes makes addressing all risks a challenging task. Information security standards have positioned themselves as generic solutions to tackle a broad range of risks and try to guide security managers in their endeavors. H...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009