Information Systems Security Management: A Review and a Classification of the ISO Standards

نویسندگان

  • Aggeliki Tsohou
  • Spyros Kokolakis
  • Costas Lambrinoudakis
  • Stefanos Gritzalis
چکیده

The need for common understanding and agreement of functional and non-functional requirements is well known and understood by information system designers. This is necessary for both: designing the “correct” system and achieving interoperability with other systems. Security is maybe the best example of this need. If the understanding of the security requirements is not the same for all involved parties and the security mechanisms that will be implemented do not comply with some globally accepted rules and practices, then the system that will be designed will not necessarily achieve the desired security level and it will be very difficult to securely interoperate with other systems. It is therefore clear that the role and contribution of international standards to the design and implementation of security mechanisms is dominant. In this paper we provide a state of the art review on information security management standards published by the International Organization for Standardization and the International Electrotechnical Commission. Such an analysis is meaningful to security practitioners for an efficient management of information security. Moreover, the classification of the standards in the clauses of ISO/IEC 27001:2005 that results from our analysis is expected to provide assistance in dealing with the plethora of security standards.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

امنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور

Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...

متن کامل

Evaluation of Radiology and Pathology Subsystems of Hospital Information Systems

Background & Aims: Compliance with standards of designing information systems leads to efficient utilization and ease of use for consumers. In this study, the compliance of the radiology and pathology subsystems of a hospital information system with ISO 9241 section 12 was assessed in selected hospitals affiliated with Kerman University of Medical Sciences, Iran. Methods...

متن کامل

بررسی استاندارد های مدیریت اطلاعات کمیسیون اعتباربخشی مراکز توانبخشی

Background and Aim: Development and evaluation of rehabilitation services as a section of health system, which plays an important role in the improvement of the quality of life, needs a mechanism for information management as well as other healthcare levels. The effectiveness of information management has been assured through standardization & ongoing evaluation of rehabilitation centers. There...

متن کامل

The Effect of the Implementation of Quality Management System (ISO 9001: 2002) on the Improvement of the Performance of Medical Records Department in Shiraz Namazi Hospital (2003-2005)

Background & Aims: Nowadays, new attitudes of clients, patients and students toward the quality of health care services, have led to unifying different systems in educational centers, which has been recognized as quality management system. The ISO standard series have created systems that integrate intra and inter organization processes to improve the quality of health services. The aim of the ...

متن کامل

Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry

Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009