نتایج جستجو برای: ایزو 27001

تعداد نتایج: 974  

Journal: :CoRR 2012
Sasko Ristov Marjan Gusev Magdalena Kostoska

Cloud computing providers‘ and customers‘ services are not only exposed to existing security risks, but, due to multi-tenancy, outsourcing the application and data, and virtualization, they are exposed to the emergent, as well. Therefore, both the cloud providers and customers must establish information security system and trustworthiness each other, as well as end users. In this paper we analy...

2009
Thierry Valdevit Nicolas Mayer Béatrix Barafort

While Information Security Management Systems (ISMS) are being adopted by the biggest IT companies, it remains quite difficult for smaller entities to implement and maintain all the requirements of ISO/IEC 27001. In order to increase information security in Luxembourg, the Public Research Centre Henri Tudor has been charged by the Luxembourg Ministry of Economy and Foreign Trade to find solutio...

2010
Wolfgang Böhmer

Die ISO27001:2005 als Informationssicherheitsmanagementsystem (ISMS) etabliert sich zunehmend als der Sicherheitsstandard in Unternehmen. Die Grundidee des ISMS basiert auf einem Management der Informationssicherheit welches ausgerichtet ist auf dem Management der Unternehmensrisiken und einen direkten Bezug zum Firmenumsatz herstellt. Bis September 2009 wurden weltweit mehr als 5822 1 zertifiz...

2014
Kristian Beckers Maritta Heisel Bjørnar Solhaug Ketil Stølen

Established standards on security and risk management provide guidelines and advice to organizations and other stakeholders on how to fulfill their security needs. However, realizing and ensuring compliance with such standards may be challenging. This is partly because the descriptions are very generic and have to be refined and interpreted by security experts, and partly because they lack tech...

2011
Ingo Müller Jun Han Jean-Guy Schneider Steven Versteeg

The ISO 27001 standard specifies an information security management system (ISMS) as a means to implement security best practices for IT systems. Organisations that implement an ISMS typically experience various challenges such as enforcing a common vocabulary, limiting human errors and integrating existing management tools and security mechanisms. However, ISO 27001 does not provide guidance o...

Journal: :Information 2016
Kristian Beckers Jürgen Dürrwang Dominik Holling

The automotive industry has successfully collaborated to release the ISO 26262 standard for developing safe software for cars. The standard describes in detail how to conduct hazard analysis and risk assessments to determine the necessary safety measures for each feature. However, the standard does not concern threat analysis for malicious attackers or how to select appropriate security counter...

2016
César Pardo Francisco J. Pino Félix Garcia

In recent times, and in order to maintain an integrated, efficient and homogeneous policy, Integrated Management Systems (IMS) have emerged as an opportunity to improve processes related to Information Technology (IT) in organizations in a way that is modular, consistent and orderly. The ISO 27001 and ISO 20000 standards provide good practices for creating and/or strengthening management infras...

2008
Thomas Neubauer Andreas Ekelhart Stefan Fenz

IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitigate these threats and legal acts demand their implementation, companies often refrain from the implementation of information security standards, especially due to high costs and the lack of evidence for a positive cost/benefit...

Journal: :CoRR 2011
Tolga Mataracioglu Sevgi Özkan

In this paper, after giving a brief definition of Information Security Management Systems (ISMS), ISO 27001, IT governance and COBIT, pros and cons of implementing only COBIT, implementing only IS

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه سیستان و بلوچستان - دانشکده مدیریت و حسابداری 1393

در طی سال ها، سازمان ها زیان های سیستمی بسیاری را تجربه کرده اند که این زیان ها تاثیر مستقیمی بر ارزشمندترین دارایی آنها یعنی اطلاعات داشته است. دستیابی به امنیت اطلاعات با پیاده سازی مجموعه ای از کنترل های مناسب و فعالیت های نرم افزاری و سخت افزاری میسر می شود. از طرف دیگر فرایند شناسایی و انتخاب موثرترین کنترل های امنیت اطلاعات در سازمان ها از گذشته به صورت چالش بزرگی مطرح بوده است. در این زم...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید