Information security failures identified and measured - ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis

被引:1
|
作者
Suorsa, M. [1 ,2 ]
Helo, P. [1 ]
机构
[1] Univ Vaasa, Sch Technol & Innovat, Vaasa, Finland
[2] Univ Vaasa, Sch Technol & Innovat, PB 700, Vaasa 65101, Finland
来源
INFORMATION SECURITY JOURNAL | 2024年 / 33卷 / 03期
关键词
Information security; ISO; 27001; GDPR; General Data Protection Regulation;
D O I
10.1080/19393555.2023.2270984
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper identifies the failures and impacts of information security, as well as the most effective controls to mitigate information security risks in organizations.Root cause analysis was conducted on all year 2020 GDPR penalty cases (n = 81) based on misconduct as defined in GDPR article 32: "security of processing." ISO/IEC 27,001 controls were used as failure identifiers in the analysis. As a result, this study presents both the most frequent and most expensive information security failures and correspondingly ranks and presents the correlation of the controls observed in the analysis. From a theoretical perspective, our study contributes by bridging the gap between regulation and information security and introduces a statistical method to analyze the GDPR penalty cases, and provides previously unreported findings about information security failures and their respective solutions. From a practical perspective, the results of our study are useful for organizations which aspire to manage information security more effectively in order to prevent the most typical and expensive information security failures. Organizations, as well as auditors implementing and assuring the ISO 27001, may use our results as a guideline whereby controls should be applied and verified first in sequential order based on their impact and interdependence
引用
收藏
页码:285 / 306
页数:22
相关论文
共 22 条
  • [1] Information security failures identified and measured - ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis (vol Oct, 10.1080/19393555.2023.2270984, 2023)
    Suorsa, M.
    Helo, P.
    [J]. INFORMATION SECURITY JOURNAL, 2024, 33 (04): : 454 - 454
  • [2] From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls
    Diamantopoulou, Vasiliki
    Tsohou, Aggeliki
    Karyda, Maria
    [J]. INFORMATION AND COMPUTER SECURITY, 2020, 28 (04) : 645 - 662
  • [3] NEW STANDARD ISO/IEC 27001:2013 OF INFORMATION SECURITY MANAGEMENT SYSTEM
    Drastich, Martin
    [J]. KNOWLEDGE FOR MARKET USE 2014: MEDIA AND COMMUNICATION IN THE 21ST CENTURY, 2014, : 387 - 393
  • [4] From ISO/IEC 27002:2013 Information Security Controls to Personal Data Protection Controls: Guidelines for GDPR Compliance
    Diamantopoulou, Vasiliki
    Tsohou, Aggeliki
    Karyda, Maria
    [J]. COMPUTER SECURITY, ESORICS 2019, 2020, 11980 : 238 - 257
  • [5] An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls
    Sheikhpour, Razieh
    Modiri, Nasser
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2012, 6 (02): : 13 - 28
  • [6] COMPARATIVE STUDY REGARDING INTERNATIONAL STANDARDS ON INFORMATION SECURITY MANAGEMENT SYSTEMS IN ORGANIZATIONS: ISO/IEC 27001:2013 vs ISO/IEC 27001:2005
    Tiganoaia, Bogdan
    [J]. GLOBALIZATION AND INTERCULTURAL DIALOGUE: MULTIDISCIPLINARY PERSPECTIVES - ECONOMY AND MANAGEMENT, 2014, : 102 - 109
  • [7] Information Security Management Systems - A Maturity Model Based on ISO/IEC 27001
    Proenca, Diogo
    Borbinha, Jose
    [J]. BUSINESS INFORMATION SYSTEMS (BIS 2018), 2018, 320 : 102 - 114
  • [8] AUTOMATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE ISO/IEC 27001 STANDARD
    de la Rosa Martin, Tonyse
    [J]. REVISTA UNIVERSIDAD Y SOCIEDAD, 2021, 13 (05): : 495 - 506
  • [9] Customized Diagnostic Tool for The Security Maturity Level of The Enterprise Information Based on ISO/IEC 27001
    Lopez-Leyva, Josue A.
    Kanter-Ramirez, Christopher A.
    Morales-Martinez, Jose P.
    [J]. 2020 8TH EDITION OF THE INTERNATIONAL CONFERENCE IN SOFTWARE ENGINEERING RESEARCH AND INNOVATION (CONISOFT 2020), 2020, : 147 - 153
  • [10] A Model of an Information Security Management System Based on NTC-ISO/IEC 27001 Standard
    Fonseca-Herrera, Omar A.
    Rojas, Alix E.
    Florez, Hector
    [J]. IAENG International Journal of Computer Science, 2021, 48 (02) : 1 - 10