The Evaluation of the Electronic Services with Accordance to IT-security Requirements Based on ISO/IEC 27001

被引:0
|
作者
Livshitz, Ilya I. [1 ]
Nikiforova, Kseniya A. [1 ]
Lontsikh, Pavel A. [2 ]
Karaseva, Viktoria A. [2 ]
机构
[1] JSC Gazinformserv, St Petersburg, Russia
[2] Natl Res Irkutsk State Tech Univ, Irkutsk, Russia
来源
PROCEEDINGS OF THE 2016 IEEE CONFERENCE ON QUALITY MANAGEMENT, TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&MQ&IS) | 2016年
关键词
Information security; Information Security Management System; audit; risk management; threats; vulnerabilities; Standards;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
This publication discusses the problem of compliance evaluation for electronic services (ES). The relevance of this publication caused certain problems in the ES organization, formation of international confidence in the ES provided, as well as a wide range of approaches to ensure IT-security. It is noted that along with well-known standards set by the various national regulators, well-known term for the purpose of forming an objective and independent evidence of the ES credibility can provide international standards ISO 27001 series. Methodical basis of the ISO 27001 series operates with an objective and independent assessment of the many IT-security metrics for the quantitative estimation of the IT-security level for ES. The obtained results can find application in the provision of international confidence for ES services through objective and independent IT-security evaluation.
引用
收藏
页数:4
相关论文
共 50 条
  • [1] A new model of a system to monitor the activity of employees in the organization in accordance with ISO/IEC 27001 requirements
    El Fray, Imed
    PRZEGLAD ELEKTROTECHNICZNY, 2012, 88 (11A):
  • [2] Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001
    Proenca, Diogo
    Borbinha, Jose
    BUSINESS INFORMATION SYSTEMS (BIS 2018), 2018, 320 : 102 - 114
  • [3] Information Security Risk Management: Handbook for ISO/IEC 27001
    Lomas, Elizabeth
    RECORDS MANAGEMENT JOURNAL, 2011, 21 (03) : 239 - +
  • [4] AUTOMATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE ISO/IEC 27001 STANDARD
    de la Rosa Martin, Tonyse
    REVISTA UNIVERSIDAD Y SOCIEDAD, 2021, 13 (05): : 495 - 506
  • [5] Information security and value creation: The performance implications of ISO/IEC 27001
    Podrecca, Matteo
    Culot, Giovanna
    Nassimbeni, Guido
    Sartor, Marco
    COMPUTERS IN INDUSTRY, 2022, 142
  • [6] Information security fortification by ontological mapping of the ISO/IEC 27001 standard
    Fenz, Stefan
    Goluch, Gernot
    Ekelhart, Andreas
    Riedl, Bernhard
    Weippl, Edgar
    13TH PACIFIC RIM INTERNATIONAL SYMPOSIUM ON DEPENDABLE COMPUTING, PROCEEDINGS, 2007, : 381 - +
  • [7] ADOPTION OF STANDARD FOR INFORMATION SECURITY ISO/IEC 27001 IN BOSNIA AND HERZEGOVINA
    Skopak, Anis
    Sakanovic, Semir
    INTERNATIONAL CONFERENCE ON ECONOMIC AND SOCIAL STUDIES (ICESOS'16): REGIONAL ECONOMIC DEVELOPMENT: ENTREPNEURSHIP AND INNOVATION, 2016, : 35 - 42
  • [8] COMPARATIVE STUDY REGARDING INTERNATIONAL STANDARDS ON INFORMATION SECURITY MANAGEMENT SYSTEMS IN ORGANIZATIONS: ISO/IEC 27001:2013 vs ISO/IEC 27001:2005
    Tiganoaia, Bogdan
    GLOBALIZATION AND INTERCULTURAL DIALOGUE: MULTIDISCIPLINARY PERSPECTIVES - ECONOMY AND MANAGEMENT, 2014, : 102 - 109
  • [9] Extension of ISO/IEC27001 to Mobile Devices Security Management
    Zhu, Xiaobo
    Zhu, Yunqian
    CYBER SECURITY, CNCERT 2018, 2019, 970 : 27 - 35
  • [10] Information security and value creation: The performance implications of ISO/IEC 27001
    Podrecca, Matteo
    Culot, Giovanna
    Nassimbeni, Guido
    Sartor, Marco
    Computers in Industry, 2022, 142