REQUIREMENTS ANALYSIS METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS
نویسندگان
چکیده
منابع مشابه
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding mechanisms within an organization. However, these systems currently lack the capability of producing and enforcing response policies, mainly due to their limited incident response (IR) functionality. This paper...
متن کاملanalysis of reading comprehension needs of the students of paramedical studies: the case of the students of health information management (him)
چکیده ندارد.
15 صفحه اولInformation Security Requirements for Implementing Electronic Health Records in Iran
Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...
متن کاملAuditing Information Security Management Systems – Towards a Practical Method
This paper describes a research project related to the Swedish pilot certification scheme for information security management systems, based on the British Standard BS7799. Empirical data is gathered from several organisations seeking certification according to SS627799, which is a Swedish translation of BS7799. The project is focused on problems related to the assessment of information securit...
متن کاملHierarchy Analysis Method for Management Information Systems
There are many kinds of management information systems (MISs) whether in industries or in enterprises. In China most of MISs were put into application at different time and with different demands. With the broader application of MISs, it’s becoming greater important to integrate them and realize information sharing. Hierarchy analysis method gives out a general structure for the complicated int...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Cybersecurity: Education, Science, Technique
سال: 2020
ISSN: 2663-4023
DOI: 10.28925/2663-4023.2020.9.149158