Information Security Management Systems : A Novel Framework and Software as a Tool for Compliance with Information Security Standard

個数:1
紙書籍版価格
¥31,246
  • 電子書籍

Information Security Management Systems : A Novel Framework and Software as a Tool for Compliance with Information Security Standard

  • 言語:ENG
  • ISBN:9781771885775
  • eISBN:9781351867801

ファイル: /

Description

This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances.

It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001.

The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

Table of Contents

Introduction

Study Overview

The Scope of the Problem and Motivations

Research Positioning

Research Method

Outcome and Contributions

Book Structure

Concluding Remarks

Literature Review

Introduction

Computer Security: Term and Concept

Information Security: A Part of Computer Security

Information Security Management System Standard

Information Security Management System Framework

Existing Methods and Tools to Aid in Adopting ISO 27001

Software Development Methodologies and Performance Measurement

Methodology

Introduction

An Overview of Methodology Stages

Respondents

Data Collection Method

Data Categories

Data Analysis

Integrated Solution Framework

Introduction

The Challenges

The Motivations

Existing Frameworks: The Nine State-of-the-art Frameworks (9STAF)

Overview of ISF

The Features Comparison

ISF Components

The Mathematical Notation

Computer Algorithm

Software Development

Introduction

ISM Technologies and Front-End Architecture

The Database

Software Development Stages

Release Version

Testing Stage

Comparison of ISM with some Existing Tools

Testing The Software: RISC Investigation and SP/SQ Measurement

Introduction

Research Background

Study in Brief

The Result

PART-I: Information Security Strategies

Bank of Indonesia: A Success Story

Telkom Indonesia Corp: Lessons Learned

PART II: Information Security Behavior

Attitudes to information security

Security Awareness

Security Standard

PART III: RISC Investigation

Respondents’ Self-Assessment

Information Security Self-Awareness

Management Support

Marketing Aspects

PART IV: SP / SQ Measurement

Software Overview

Cause-Effect Analysis

The Eight Fundamental Parameters Measurement

Security Culture

Efficiency and Effectiveness

Enhance Security Literacy

Conclusions and Recommendations

The Major Findings

Recommendations and Future Research Directions

Concluding Remarks

References

最近チェックした商品