An Introduction to Standards related to Information Security
نویسنده
چکیده
The good thing about standards is that there are so many of them." This humorous comment is often made when some well meaning team member wants to solve a problem by referring to a standard. This may be true, but what is also true is that information systems are becoming more "complex" (in the vaguest sense of the word), that systems and the information processed are more distributed and that the requirement for access is more demanding. Also, the requirement for access is not limited to, or from, a specific or single site, organisation or even country. This has a huge effect on interfacing requirements, information storage and presentation formats and, of course, security. Adopting internationally recognised standards is a definite route to solve a lot of these problems. Standards are a mechanism for different stakeholders to refer to a common, trusted reference. Standards provide a common technological language, thus enabling a system stakeholder to provide definitions for terms used in a project, and to qualify vague expressions such as "complex". The South African Bureau of Standards (SABS) is the recognised national institution for the promotion and maintenance of standards in South Africa. The SABS prepare and publish South African National Standards (identified by the letters SANS) reflecting national consensus on a wide range of subjects. A business unit of the SABS, Standards South Africa (StanSA), administers more than 450 technical committees and subcommittees to produce standards. The SABS is a member body of the International Organisation for Standardisation (ISO) and participates actively in a number of their committees. This tutorial provides a short introduction to International and South African National Standards related to Information Security. Some of the existing standards are highlighted and the development process is introduced. The tutorial focuses on ISO/IEC International Standards and the national adoption or development by StanSA.
منابع مشابه
Determining the appropriate methodology for the security evaluation of equipment related to information and communication technology in the power industry
Providing security in the vital infrastructures of the country, is one of the essential operations that must be taken in order to improve the security of the country. Resistant security strategies need to be regularly implemented as a dynamic process to improve security, and security evaluation is one of the most important steps in this process. Methodology in the field of evaluation in both te...
متن کاملCritical Success Factors in implementing information security governance (Case study: Iranian Central Oil Fields Company)
The oil industry, as one of the main industries of the country, has always faced cyber attacks and security threats. Therefore, the integration of information security in corporate governance is essential and a governance challenge. The integration of information security and corporate governance is called information security governance. In this research, we identified "critical success factor...
متن کاملToward an Ontology Architecture for Cyber-Security Standards
The rapid growth in magnitude and complexity of cyber-security information and event management (CSIEM) has ignited a trend toward security automation and information exchange standards. Making Security Measurable (MSM) references a collection of open community standards for the common enumeration, expression and reporting of cyber-security-related information. While MSM-related standards are v...
متن کاملProtecting Personal Data: Can IT Security Management Standards Help?
Compelled to improve information security by the introduction of personal data protection legislation, organizations worldwide are adopting standardized security management guidelines to inform their internal processes. This paper analyzes whether existing security management standards support process requirements for personal data management, drawing from experience with security policies in p...
متن کاملامنیت اطلاعات سامانه های تحت وب نهاد کتابخانه های عمومی کشور
Purpose: This paper aims to evaluate the security of web-based information systems of Iran Public Libraries Foundation (IPLF). Methodology: Survey method was used as a method for implementation. The tool for data collection was a questionnaire, based on the standard ISO/IEC 27002, that has the eleven indicators and 79 sub-criteria, which examines security of web-based information systems of IP...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2008