Standardization of all Information Security Management Systems

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Interpreting the management of information systems security

............................................................................................................................................3 Acknowledgements...........................................................................................................................4 1 Orientation................................................................................................ 12 1.

متن کامل

A Study on E-Taiwan Promotion Information Security Governance Programs with E-government Implementation of Information Security Management Standardization

The promotion of Information Security Governance (ISG) has become an important factor in the implementation of e-government and information security management within the “National Information and Communications Technology Security Development Program (2009 ̃2012)” in continuing the “Plan for Establishment of Information and Communication Technology Infrastructure Security Mechanism (2001 ̃2008)”...

متن کامل

Aligning Security Awareness With Information Systems Security Management

This paper explores the way information security awareness connects to the overall information security management framework it serves. To date, the formulation of security awareness initiatives has tended to ignore the important relationship with the overall security management context, and vice versa. In this paper we show that the two processes can be aligned so as to ensure that awareness a...

متن کامل

Standardization of Information Security Management System: ISO/IEC 27001: 2005, ITIL®, CoBIT®

Information is currently the most important asset of modern companies. Its security is therefore very important and becomes the top priority of each company. Unfortunately, there is no simple recipe providing 100 % security of information. A company must apply the best security procedures with the aim to achieve an appropriate level of its information security. This paper presents and compares ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Computer Applications

سال: 2011

ISSN: 0975-8887

DOI: 10.5120/2307-2592