ITIL® and Information Security

被引:0
|
作者
Jasek, Roman [1 ]
Kralik, Lukas [1 ]
Popelka, Miroslav [1 ]
机构
[1] Tomas Bata Univ Zlin, Fac Appl Informat, Zlin 76005, Czech Republic
来源
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE OF NUMERICAL ANALYSIS AND APPLIED MATHEMATICS 2014 (ICNAAM-2014) | 2015年 / 1648卷
关键词
ITIL; ISM; Information Security; Information Security Management; ISO; 20000; 27000;
D O I
10.1063/1.4912775
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper discusses the context of ITIL framework and management of information security. It is therefore a summary study, where the first part is focused on the safety objectives in connection with the ITIL framework. First of all, there is a focus on ITIL process ISM (Information Security Management), its principle and system management. The conclusion is about link between standards, which are related to security, and ITIL framework.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] The management in the security of the information according to Cobit, Itil and Iso 27000
    Montano Orrego, Vladimir
    REVISTA PENSAMIENTO AMERICANO, 2011, 4 (06): : 21 - 23
  • [2] Proposals for Postgraduate Students to Reinforce Information Security Management Inside ITIL (R)
    Ruiz Larrocha, Elena
    Minguet, Jesus M.
    Diaz, Gabriel
    Castro, Manuel
    Vara, Alfonso
    Martin, Sergio
    San Cristobal, Elio
    INTERNATIONAL JOURNAL OF HUMAN CAPITAL AND INFORMATION TECHNOLOGY PROFESSIONALS, 2011, 2 (02) : 16 - 25
  • [3] Model Design of Information Security Governance Assessment with Collaborative Integration of COBIT 5 and ITIL
    Kusumah, Perdana
    Sutikno, Sarwono
    Rosmansyah, Yusep
    2014 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS), 2014, : 1 - 6
  • [4] Toward an Effective Information Security Risk Management of Universities' Information Systems Using Multi Agent Systems, Itil, Iso 27002, Iso 27005
    Faris, S.
    Medromi, H.
    El Hasnaoui, S.
    Iguer, H.
    Sayouti, A.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (06) : 114 - 118
  • [5] Effects of virtualization on information security
    Li, Shing-Han
    Yen, David C.
    Chen, Shih-Chih
    Chen, Patrick S.
    Lu, Wen-Hui
    Cho, Chien-Chuan
    COMPUTER STANDARDS & INTERFACES, 2015, 42 : 1 - 8
  • [6] Progress in Introducing ITIL into an Information Systems Curriculum
    Jarman, Rodney
    AMCIS 2011 PROCEEDINGS, 2011,
  • [7] INFORMATION TECHNOLOGY SERVICE MANAGEMENT BASED ON ITIL
    Kapron, Tomasz
    RYNEK ENERGII, 2009, (01): : 74 - 78
  • [8] Information security management: An information security retrieval and awareness model for industry
    Kritzinger, E.
    Smith, E.
    COMPUTERS & SECURITY, 2008, 27 (5-6) : 224 - 231
  • [9] ITIL based service level management if SLAs cover security
    Feglar, T
    ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 3, Proceedings, 2004, : 225 - 230
  • [10] An Information Technology System Management Platform Based on ITIL
    Zhang, Li-Yi
    Tu, Xiao-Fan
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5130 - +