نتایج جستجو برای: استاندارد isoiec 27002
تعداد نتایج: 35442 فیلتر نتایج به سال:
Problem statement: There are several IT best practices and IT standards, which are independently supporting enterprises. Some of them have similarities and other differ from each other. This study discusses these best practices and standards in contrast with ITIL. Approach: CMMI, CobiT, eTOM, ISO 9000, ISO/IEC 17799, Malcolm Baldrige and Six Sigma will be introduces along with ITIL. Results: Th...
La seguridad informática es esencial en la educación digital para proteger información y garantizar su integridad, confidencialidad disponibilidad. Se han realizado diversos estudios sobre este tema, resaltando aplicación de normas internacionales como ISO/IEC 27002:2013 instituciones educativas papel crucial el ámbito académico los sistemas información. Para enfrentar las amenazas informática,...
most organizations need to information systems to survive and thrive. therefore, they should seriously protect their information assets. creating structured and justifiable exchanges between cost, security and mission control systems security risks is essential. this is important in the planning and development of such systems. initial appropriate decisions can reduce costs and increase ease of...
Nowadays, most business operations are supported by IT systems. Therefore, their availability is critical to keep business running smoothly and continuously. In order to provide high quality IT services, a well-managed data center is required to house computer servers, storage systems, network devices, and their associated components. Downtime of the data center can be costly resulting in produ...
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A literature review was conducted in order to understand the reasons for the low level of adoption of information security standards by companies, and to identify the drivers and the success factors in implementation of these standards. Based on the findings o...
Universities in the public and private sectors depend on information technology and information systems to successfully carry out their missions and business functions. Information systems are subject to serious threats that can have adverse effects on organizational operations and assets, and individuals by exploiting both known and unknown vulnerabilities to compromise the confidentiality, in...
The provision of choice is one of the most common vehicles through which managers empower employees in organizations. Although past psychological and organizational research persuasively suggests that choice confers personal agency, and is thus intrinsically motivating, emerging research indicates that there could be potential pitfalls. In this chapter, we examine the various factors that could...
Information security plays a key role in protection of organization’s assets. There exist a number of standards and guidelines providing huge lists of security controls that, if properly used, might be useful against cyber threats. However, these standards leave the process of controls selection to the organizations. Security manager has to carry out a decision on implementation of security con...
BACKGROUND Even though many safeguards and policies for electronic health record (EHR) security have been implemented, barriers to the privacy and security protection of EHR systems persist. OBJECTIVE This article presents the results of a systematic literature review regarding frequently adopted security and privacy technical features of EHR systems. METHOD Our inclusion criteria were full...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید