Competence Requirements of ISO/IEC Standards for Information Security Professionals
نویسندگان
چکیده
منابع مشابه
Information Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملinformation security requirements for implementing electronic health records in iran
background and goal: ict development in recent years has created excellent developments in human social and economic life. one of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (ehr).the purpose of this research is to investigate the effects information security requirements in electronic health records a...
متن کاملInformation Security Standards for E-businesses
The process of buying, selling or interacting with customers via Internet, Tele-sale, Smart card or other computer network is referred to as Electronics Commerce. Whereas online trade has been touting its flexibility, convenience and cost savings, the newest entrant is wireless e-commerce. This form of business offers many attractions; including 24 hours seven days’ open shop–business, vastly r...
متن کاملInformation Security Policy - What do International Information Security Standards say?
One of the most information security controls is the information security policy. This vital direction-giving document is, however, not always easy to develop and the authors thereof battle with questions such as what constitutes a policy. This results in the policy authors turning to existing sources for guidance. One of these sources is the various international information security standards...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Bezopasnost informacionnyh tehnology
سال: 2017
ISSN: 2074-7136,2074-7128
DOI: 10.26583/bit.2017.4.01