AUTOMATION OF AN INFORMATION SECURITY MANAGEMENT SYSTEM BASED ON THE ISO/IEC 27001 STANDARD

被引:0
|
作者
de la Rosa Martin, Tonyse [1 ]
机构
[1] Univ Metropolitana, Quito, Ecuador
来源
REVISTA UNIVERSIDAD Y SOCIEDAD | 2021年 / 13卷 / 05期
关键词
ISO; security; information; automation; risk; system;
D O I
暂无
中图分类号
C [社会科学总论];
学科分类号
03 ; 0303 ;
摘要
The present work aims to describe the requirements for the implementation and the necessary documentation of an Information Security Management System (ISMS). Automation consists of the availability of a template with internal control questions focused on the 3 pillars of information se-curity (confidentiality, integrity, availability) that allows a "Gap-Analysis" to be carried out to meas-ure the level of current maturity with respect to the requirements of the international standard ISO / IEC 27001: 2013, with a radar diagram and thus establish an ISMS or carry out the ISO 27001 certification process that guarantees to minimize risk and protect information on computers or in interconnected systems, since it is one of the most important assets of organizations, ensuring the confidentiality and integrity of the data and information of certain critical or sensitive processes, whose loss, leakage or unavailability of information puts problems in the organization.
引用
收藏
页码:495 / 506
页数:12
相关论文
共 50 条
  • [31] Evaluation of the Degree of Knowledge and Implementation of Information Security Management Systems, based of the NCh-ISO 27001 Standard, in Health Institutions
    Rienzo, Antonio
    Bustamante, Miguel
    Aravena, Camilo
    Lefranc, Gaston
    [J]. 2018 IEEE INTERNATIONAL CONFERENCE ON AUTOMATION/XXIII CONGRESS OF THE CHILEAN ASSOCIATION OF AUTOMATIC CONTROL (ICA-ACCA), 2018,
  • [32] Using ISO 27001 in Teaching Information Security
    Abu Talib, Manar
    Khelifi, Adel
    Ugurlu, Tahsin
    [J]. 38TH ANNUAL CONFERENCE ON IEEE INDUSTRIAL ELECTRONICS SOCIETY (IECON 2012), 2012, : 3149 - 3153
  • [33] The Evaluation of the Electronic Services with Accordance to IT-security Requirements Based on ISO/IEC 27001
    Livshitz, Ilya I.
    Nikiforova, Kseniya A.
    Lontsikh, Pavel A.
    Karaseva, Viktoria A.
    [J]. PROCEEDINGS OF THE 2016 IEEE CONFERENCE ON QUALITY MANAGEMENT, TRANSPORT AND INFORMATION SECURITY, INFORMATION TECHNOLOGIES (IT&MQ&IS), 2016,
  • [34] Assessment of ISMS Based On Standard ISO/IEC 27001:2013 at DISKOMINFO Depok City
    Nurbojatmiko
    Susanto, Aries
    Shobariah, Euis
    [J]. 2016 4TH INTERNATIONAL CONFERENCE ON CYBER AND IT SERVICE MANAGEMENT, 2016, : 43 - 48
  • [35] Policies based on ISO 27001: 2013 and its influence on information security management in municipalities of Peru
    Bustamante Garcia, Shonerly
    Valles Coral, Miguel Angel
    Cuellar Rodriguez, Immer Elias
    Levano Rodriguez, Danny
    [J]. ENFOQUE UTE, 2021, 12 (02): : 69 - 79
  • [36] Management of information security for an electric power utility -: On security domains and use of ISO/IEC17799 standard
    Ericsson, GN
    Torkilseng, Å
    [J]. IEEE TRANSACTIONS ON POWER DELIVERY, 2005, 20 (02) : 683 - 690
  • [37] PHYSICAL AND LOGICAL SECURITY MANAGEMENT ORGANIZATION MODEL BASED ON ISO 31000 AND ISO 27001
    Pecina, Koldo
    Estremera, Ricardo
    Bilbao, Alfonso
    Bilbao, Enrique
    [J]. 2011 IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST), 2011,
  • [38] The effect of ISO/IEC 27001 standard over open-source intelligence
    Qusef, Abdallah
    Alkilani, Hamzeh
    [J]. PeerJ Computer Science, 2022, 8
  • [39] Information security failures identified and measured - ISO/IEC 27001:2013 controls ranked based on GDPR penalty case analysis
    Suorsa, M.
    Helo, P.
    [J]. INFORMATION SECURITY JOURNAL, 2024, 33 (03): : 285 - 306
  • [40] The effect of ISO/IEC 27001 standard over open-source intelligence
    Qusef, Abdallah
    Alkilani, Hamzeh
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8