Information technology. Security techniques. Information security management system implementation guidance

Author(s):  
Vitomir T. Miladinović

Based on author’s experiencie, in this we will analyze some issues of awareness and competence development of all employees in the organization in the processes of information security management system (ISMS), in accordance with the requirements of the International Standard SRPS ISO/IEC 27001 Information Technology — Security Techniques — Information Security Management Systems — Requirements.


Author(s):  
Wolfgang Boehmer

With the widespread dissemination of Information Technology in enterprises and households in the mid-90s, discussions began on how to manage it. Meanwhile, in the area of enterprise security management systems worldwide, enforced use of the Deming cycle initially worked against the implementation of policies. Standard management systems include ISMS (Information Security Management System) as specified in ISO 27001, BCM (Business Continuity Management System) as specified in BS 25999, and ITSM (Information Technology Service Management System) as specified in ISO 20000. In contrast to policies, these best-practice management systems continue to operate today with no formal method. Management systems have, however, some advantages that policies do not have. In this chapter, the authors present possible uses of policies with respect to management systems and identify potential applications. Furthermore, the authors present a field study, cited here, which highlights the advantages of management systems in practice. Moreover, this chapter shows how a formal description of an information security management system can be created by means of discrete-event systems theory and how an objective function for management systems can be defined.


2016 ◽  
Vol 22 (10) ◽  
pp. 3023-3026 ◽  
Author(s):  
Nurazean Maarop ◽  
Kavitha Thamadharan ◽  
Ganthan Narayana Samy ◽  
Norziha Megat Mohd Zainuddin ◽  
Azri Azmi ◽  
...  

2012 ◽  
Vol 2 (2) ◽  
Author(s):  
Alpana Kakkar ◽  
Ritu Punhani ◽  
Deepak Jain

The growth of computers and of information technology has been explosive. As a result, information technology has been widely applied in every aspect of our life—from business, government, education, finance, health-care, aerospace to national defence. Computers, especially networked computers, have brought benefits to us and improved our lives. However, surveys and reports from various industry associations and security organizations suggested that only a few organizations can successfully protect their information assets. Organizations realize that information security is a complex issue, involving both human and technical factors. This paper is an attempt to empirically assess the maturity of Information Security Management System (ISMS) implementation in selected IT Service organizations in terms of confidence of their employees on their Information Security Management System.


Sign in / Sign up

Export Citation Format

Share Document