REQUIREMENTS ANALYSIS METHOD OF INFORMATION SECURITY MANAGEMENT SYSTEMS

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Incident response requirements for distributed security information management systems

Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding mechanisms within an organization. However, these systems currently lack the capability of producing and enforcing response policies, mainly due to their limited incident response (IR) functionality. This paper...

متن کامل

Information Security Requirements for Implementing Electronic Health Records in Iran

Background and Goal: ICT development in recent years has created excellent developments in human social and economic life. One of the most important opportunities to use information technology is in the medical field, that the result would be electronic health record (EHR).The purpose of this research is to investigate the effects information securi...

متن کامل

Auditing Information Security Management Systems – Towards a Practical Method

This paper describes a research project related to the Swedish pilot certification scheme for information security management systems, based on the British Standard BS7799. Empirical data is gathered from several organisations seeking certification according to SS627799, which is a Swedish translation of BS7799. The project is focused on problems related to the assessment of information securit...

متن کامل

Hierarchy Analysis Method for Management Information Systems

There are many kinds of management information systems (MISs) whether in industries or in enterprises. In China most of MISs were put into application at different time and with different demands. With the broader application of MISs, it’s becoming greater important to integrate them and realize information sharing. Hierarchy analysis method gives out a general structure for the complicated int...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Cybersecurity: Education, Science, Technique

سال: 2020

ISSN: 2663-4023

DOI: 10.28925/2663-4023.2020.9.149158