نتایج جستجو برای: استاندارد iso 27001
تعداد نتایج: 57386 فیلتر نتایج به سال:
In order to handle their regulatory and legal responsibilities retain trustworthy strategic partnerships, enterprises need be dedicated guaranteeing the privacy, accessibility, authenticity of data at disposal. Companies can become more resilient in face information security threats cyberattacks by effectively integrating strategies. The goal this article is describe a plan that corporation has...
چکیده هدف از این پژوهش که با روش توصیفی از نوع پیمایشی و از شاخه تحقیقات میدانی انجام گرفته است؛ ارزیابی نظام آموزش کارکنان دانشگاه شاهد بر اساس استاندارد بین المللی ایزو 10015 و با تاکید بر فرایندهای عمومی نظام آموزشی کارکنان می باشد. جامعه آماری تحقیق کلیه کارکنان دانشگاه شاهد در سال 1392 را شامل شده و از بین آنها تعداد 300 نفر به عنوان نمونه آماری با روش تصادفی طبقه بندی شده انتخاب شدند. ا...
Medical Organization Information Security Management Based on ISO27001 Information Security Standard
Most of the information security events in medical organizations are due to improper management. This is a clear indication that the security of information is an issue related to information and communication technology and a management issue as well. In a review of literature, most research on information security has focused on information and communication technology issues, such as network...
A number of different security standards exist and it is difficult to choose the right one for a particular project or to evaluate if the right standard was chosen for a certification. These standards are often long and complex texts, whose reading and understanding takes up a lot of time. We provide a conceptual model for security standards that relies upon existing research and contains conce...
This paper describes the development of situational awareness models and applications to assess cybersecurity risks based on Annex ISO 27001:2013. The risk assessment method used is direct testing method, namely audit, exercise penetration testing. this study classified into three levels, high, medium low. A high-risk value an unacceptable value. Meanwhile, low values can be categorized as acce...
Managing information security in the organization may be a daunting task, especially considering that it encompass many areas from physical and network to human resources management of suppliers. This is where frameworks come handy put formality into process design implementation strategy. While there are bunch different out wild, most commonly-found preferred by professionals worldwide ISO/IEC...
Actually Information security becomes a very important part for the organization’s intangible assets, so level of confidence and stakeholder trusted are performance indicator as successes organization. Since information security has a very important role in supporting the activities of the organization, we need a standard or benchmark which regulates governance over information security. The ma...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید