نتایج جستجو برای: استاندارد iso 27001

تعداد نتایج: 57386  

Journal: :Sustainability 2023

In order to handle their regulatory and legal responsibilities retain trustworthy strategic partnerships, enterprises need be dedicated guaranteeing the privacy, accessibility, authenticity of data at disposal. Companies can become more resilient in face information security threats cyberattacks by effectively integrating strategies. The goal this article is describe a plan that corporation has...

Journal: :International Journal for Research in Applied Science and Engineering Technology 2019

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه شاهد - دانشکده علوم انسانی 1392

چکیده هدف از این پژوهش که با روش توصیفی از نوع پیمایشی و از شاخه تحقیقات میدانی انجام گرفته است؛ ارزیابی نظام آموزش کارکنان دانشگاه شاهد بر اساس استاندارد بین المللی ایزو 10015 و با تاکید بر فرایندهای عمومی نظام آموزشی کارکنان می باشد. جامعه آماری تحقیق کلیه کارکنان دانشگاه شاهد در سال 1392 را شامل شده و از بین آنها تعداد 300 نفر به عنوان نمونه آماری با روش تصادفی طبقه بندی شده انتخاب شدند. ا...

Journal: :JSW 2012
Kuo-Hsiung Liao Hao-En Chueh

Most of the information security events in medical organizations are due to improper management. This is a clear indication that the security of information is an issue related to information and communication technology and a management issue as well. In a review of literature, most research on information security has focused on information and communication technology issues, such as network...

2014
Kristian Beckers Isabelle Côté Stefan Fenz Denis Hatebur Maritta Heisel

A number of different security standards exist and it is difficult to choose the right one for a particular project or to evaluate if the right standard was chosen for a certification. These standards are often long and complex texts, whose reading and understanding takes up a lot of time. We provide a conceptual model for security standards that relies upon existing research and contains conce...

Journal: :Risks 2022

This paper describes the development of situational awareness models and applications to assess cybersecurity risks based on Annex ISO 27001:2013. The risk assessment method used is direct testing method, namely audit, exercise penetration testing. this study classified into three levels, high, medium low. A high-risk value an unacceptable value. Meanwhile, low values can be categorized as acce...

Journal: :Kìberbezpeka. osvìta, nauka, tehnìka 2023

Managing information security in the organization may be a daunting task, especially considering that it encompass many areas from physical and network to human resources management of suppliers. This is where frameworks come handy put formality into process design implementation strategy. While there are bunch different out wild, most commonly-found preferred by professionals worldwide ISO/IEC...

Journal: :CoRR 2012
Heru Susanto Mohammad Nabil Almunawar Yong Chee Tuan Mehmet Sabih Aksoy Wahyudin P. Syam

Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید