Description
This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances.
It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001.
The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.
Table of Contents
Introduction
Study Overview
The Scope of the Problem and Motivations
Research Positioning
Research Method
Outcome and Contributions
Book Structure
Concluding Remarks
Literature Review
Introduction
Computer Security: Term and Concept
Information Security: A Part of Computer Security
Information Security Management System Standard
Information Security Management System Framework
Existing Methods and Tools to Aid in Adopting ISO 27001
Software Development Methodologies and Performance Measurement
Methodology
Introduction
An Overview of Methodology Stages
Respondents
Data Collection Method
Data Categories
Data Analysis
Integrated Solution Framework
Introduction
The Challenges
The Motivations
Existing Frameworks: The Nine State-of-the-art Frameworks (9STAF)
Overview of ISF
The Features Comparison
ISF Components
The Mathematical Notation
Computer Algorithm
Software Development
Introduction
ISM Technologies and Front-End Architecture
The Database
Software Development Stages
Release Version
Testing Stage
Comparison of ISM with some Existing Tools
Testing The Software: RISC Investigation and SP/SQ Measurement
Introduction
Research Background
Study in Brief
The Result
PART-I: Information Security Strategies
Bank of Indonesia: A Success Story
Telkom Indonesia Corp: Lessons Learned
PART II: Information Security Behavior
Attitudes to information security
Security Awareness
Security Standard
PART III: RISC Investigation
Respondents’ Self-Assessment
Information Security Self-Awareness
Management Support
Marketing Aspects
PART IV: SP / SQ Measurement
Software Overview
Cause-Effect Analysis
The Eight Fundamental Parameters Measurement
Security Culture
Efficiency and Effectiveness
Enhance Security Literacy
Conclusions and Recommendations
The Major Findings
Recommendations and Future Research Directions
Concluding Remarks
References
-
- 電子書籍
- ケンガンオメガ(23) 裏少年サンデー…
-
- 電子書籍
- 愛に飢えた相続人【分冊】 12巻 ハー…
-
- 電子書籍
- 恋に落ちたマリア【分冊】 11巻 ハー…
-
- 電子書籍
- いつかレディに【7分冊】 5巻 ハーレ…
-
- 電子書籍
- マグマ 角川文庫