نتایج جستجو برای: استاندارد isoiec 27002

تعداد نتایج: 35442  

2010
Siridech Kumsuprom Brian J. Corbitt Siddhi Pittayachawan Phoommhiphat Mingmalairaks

This paper reports a study of the key factors that affect ICT risk management using Thai businesses as the data sources. Three hundred and two respondents from listed organisations on the Stock Exchange of Thailand (SET) were surveyed and the data analysed to establish the strength of relationships in a model derived from extant literature and the application of the two most commonly used gover...

بیشتر سازمان­ها برای بقا و پیشرفت به سیستم‎های اطلاعاتی نیاز دارند، در نتیجه باید به­طور جدی به حفاظت از دارایی‎های اطلاعاتی خود بپردازند. ایجاد تبادلات ساختارمند و توجیه­پذیر بین هزینه، امنیت و مأموریت برای کنترل ریسک‎های سیستم‎های امنیتی، ضروری است. این امر در برنامه­ریزی و توسعۀ چنین سیستم­هایی از اهمیت ویژه‎ای برخوردار است. مدیریت ریسک و تصمیم‎گیری مناسب اولیه، می‎تواند ضمن کاهش هزینه­ها، س...

ژورنال: :فصلنامه علمی-پژوهشی مدیریت فناوری اطلاعات 2015
پریسا موسوی رضا یوسفی زنوز اکبر حسن پور

بیشتر سازمان­ها برای بقا و پیشرفت به سیستم‎های اطلاعاتی نیاز دارند، در نتیجه باید به­طور جدی به حفاظت از دارایی‎های اطلاعاتی خود بپردازند. ایجاد تبادلات ساختارمند و توجیه­پذیر بین هزینه، امنیت و مأموریت برای کنترل ریسک‎های سیستم‎های امنیتی، ضروری است. این امر در برنامه­ریزی و توسعۀ چنین سیستم­هایی از اهمیت ویژه‎ای برخوردار است. مدیریت ریسک و تصمیم‎گیری مناسب اولیه، می‎تواند ضمن کاهش هزینه­ها، س...

2015
Jason Anthony Smith William Rothwell

This paper examines malicious insider threat and explains the key differences from other types of insider threat and from external threat actors. A phase based “kill-chain” malicious insider threat model is developed and proposed to help inform selection of mitigation countermeasures which are complementary or incremental to a typically implemented traditional ISO 17799/27002 information securi...

2013
Georg Disterer

With the increasing significance of information technology, there is an urgent need for adequate measures of information security. Systematic information security management is one of most important initiatives for IT management. At least since reports about privacy and security breaches, fraudulent accounting practices, and attacks on IT systems appeared in public, organizations have recognize...

2016
Sahar Bukhari Muhammad Hasan Islam

Embedded Systems are electronic products that contain one or more than one microprocessor and software either programmable or fixed in capability, designed to perform some dedicated function within a large entity. Embedded Systems are increasingly employed in critical sectors such as in Life Critical Systems, Financial Infrastructure, Information Systems, Transportation Systems, Consumer Produc...

Journal: :Computers & Security 2005
Sebastiaan H. von Solms

This paper investigates the coexistence of and complementary use of COBIT and ISO 17799 as reference frameworks for Information Security governance. The investigation is based on a mapping between COBIT and ISO 17799 which became available in 2004, and provides a level of 'synchronization' between these two frameworks.

Journal: :Inf. Manag. Comput. Security 2014
Evandro Alencar Rigon Carla Merkle Westphall Daniel Ricardo dos Santos Carlos Becker Westphall

! ABSTRACT Purpose The lack of a security evaluation method might expose organizations to several risky situations. This paper aims at presenting a cyclical evaluation model of information security maturity. Design/methodology/approach This model was developed through the definition of a set of steps to be followed in order to obtain periodical evaluation of maturity and continuous improvement ...

2012
Francis Akowuah Xiaohong Yuan Jinsheng Xu

In the complex technological world that healthcare organizations and their business associates operate, there exist security threats and attacks which render individually identifiable health information vulnerable. Laws exist to ensure that healthcare providers take practical measures to address the security and privacy needs of health information. There are also standards that assist healthcar...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید