IMPLEMENTATION OF INFORMATION SECURITY MANAGEMENT SYSTEM

被引:0
|
作者
Drastich, Martin [1 ]
机构
[1] Tech Univ Ostrava, Fac Econ, Ostrava 70121, Czech Republic
来源
PROCEEDINGS OF THE 10TH INTERNATIONAL SCIENTIFIC CONFERENCE: ECONOMIC POLICY IN THE EUROPEAN UNION MEMBER COUNTRIES: SELECTED PAPERS | 2013年
关键词
information security management system; information security; security policy; security management;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
An ISMS is a newly used conception that includes a sum of all requirements and measures. It is defined as a set of measures and requirements in order to secure protection and security of all important corporate assets, i.e. information, know-how, property and persons that is implemented according to the recognized international standard (ISO / IEC 27001 : 2005 in Czech Republic CSN ISO / IEC 27001 : 2006). The very implementation of information security management system is not either simple or cheap matter. In this paper a procedure in individual steps has been suggested which will methodically lead to and facilitate the very implementation - from a decision made on the ISMS implementation by the management up to a certification awarded by an independent certification authority.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [41] The Construction of Information Security Management
    Quan, Yin
    SOCIAL SCIENCE AND EDUCATION, 2013, 10 : 519 - 521
  • [42] IT/IS SECURITY MANAGEMENT WITH UNCERTAIN INFORMATION
    Klimes, Cyril
    Bartos, Jiri
    KYBERNETIKA, 2015, 51 (03) : 408 - 419
  • [43] STANDARDIZATION IN INFORMATION SECURITY MANAGEMENT
    Fal', A. M.
    CYBERNETICS AND SYSTEMS ANALYSIS, 2010, 46 (03) : 512 - 515
  • [44] Knowledge management and information security
    Buogo, Mateus
    Fachinelli, Ana Cristina
    Giacomello, Cintia Paese
    ATOZ-NOVAS PRATICAS EM INFORMACAO E CONHECIMENTO, 2019, 8 (02): : 49 - 59
  • [45] Research for The Management and Technology of Library Network Information Security
    Feng, Cheng
    PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND INDUSTRIAL ENGINEERING, VOLS I AND II, 2010, : 544 - 547
  • [46] A study on information security management system evaluation - assets, threat and vulnerability
    Farn, KJ
    Lin, SK
    Fung, ARW
    COMPUTER STANDARDS & INTERFACES, 2004, 26 (06) : 501 - 513
  • [47] SYSTEM OF MEASURES RELATED TO ENSURING INFORMATION SECURITY IN THE MANAGEMENT OF EDUCATIONAL INSTITUTIONS
    Davud, Ulviyya Hajiyeva
    Mammad, Mirvari Gasimova
    Gizi, Gunay Aliyeva Dilgam
    Khaleddin, Yegana Iskenderova
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2024, 16 (03): : 523 - 528
  • [48] A Study on Information Security Management System Model for Small and Medium Enterprises
    Lee, Wan-Soo
    Jang, Sang-Soo
    RECENT ADVANCES IN E-ACTIVITIES, INFORMATION SECURITY AND PRIVACY, 2009, : 84 - +
  • [49] The Application of Information Security Encryption Technology in Military Data System Management
    Zheng, Xiaoli
    MAN-MACHINE-ENVIRONMENT SYSTEM ENGINEERING, 2018, 456 : 423 - 428
  • [50] Risk assessment of Information Security Management System inGovernment Organizations in Iran
    Fayez, Samane
    Nazeri, HodaHosseinZade
    BagherKiaroodi, Mohammad
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER, NETWORKS AND COMMUNICATION ENGINEERING (ICCNCE 2013), 2013, 30 : 77 - 79