The Measurement Design of Information Security Management System

被引:0
|
作者
Nancylia, Merry [1 ]
Mudjtabar, Eddy K. [2 ]
Sutikno, Sarwono [1 ]
Rosmansyah, Yusep [1 ]
机构
[1] Bandung Inst Technol, Sch Elect Engn & Informat, Jawa Barat, Indonesia
[2] Bandung Inst Technol, Winner Lab, Sch Elect Engn & Informat, Jawa Barat, Indonesia
关键词
measurement; security management; effectiveness; information security;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Information is an asset, such as important business assets, has value to an organization and consequently must be well protected. In organizations, information becomes an important and must remain available, and its existence should be maintained from unauthorized access. The use of information by unauthorized parties could be used for negative purposes which would be detrimental to the organization. Therefore, information security must be implemented correctly in order to avoid the impact of loss to the organization. Information security must satisfy the elements of confidentiality, integrity and availability. The international standard ISO /IEC 27000: 2014, SNI ISO / IEC 27001: 2013 and SNI ISO /IEC 27002: 2013 are a standard for Information Security Management System that can be used for the organization. These standard are able to test the security of the information and to measure the effectiveness of an implemented Information Security Management System (ISMS) which has been adopted as SNI ISO /IEC 27004: 2013. The standardization of Information Security Management Systems need an adjustment, the version of ISO /IEC 27004 The latter has adopted the development of ISO /IEC 27000, ISO / IEC 27001 and ISO /IEC 27002 which is required the measurement design of Information Security Management System. This study results in the design of the size of the Information Security Management System in accordance with the rules of international standards and the latest ISO standards. So it can be a reference for various organizations. This study aims to make a measurement design of Information Security Management System by adopting the best practices
引用
收藏
页数:5
相关论文
共 50 条
  • [21] Data security in the distributed information measurement system
    Kiprushkin, SA
    Korolev, NA
    Khakhaev, AD
    Kurskov, SY
    [J]. 8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS: INFORMATION SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 13 - 16
  • [22] Organizational Management Role In Information Security Management System
    Qusef, Abdallah
    Arafat, Mais
    Al-Taher, Samar
    [J]. ICFNDS'18: PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS AND DISTRIBUTED SYSTEMS, 2018,
  • [23] Electronic Archival Information System Security Management System
    Weng, Dong-dong
    Wang, Xiao-fang
    [J]. INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND MANAGEMENT ENGINEERING (ITME 2014), 2014, : 210 - 213
  • [24] Design of Network Security Defense System for Information System
    Li, Kexin
    Xia, Hongsen
    Zhong, Ling
    [J]. PROCEEDINGS OF ANNUAL CONFERENCE OF CHINA INSTITUTE OF COMMUNICATIONS, 2010, : 301 - 303
  • [25] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    [J]. ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [26] The Design of Information Security Risk Management: A Case Study Human Resources Information System at XYZ University
    Anang, Agus
    Gandhi, Arfive
    Sucahyo, Yudho Giri
    [J]. 2021 4TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATICS ENGINEERING (IC2IE 2021), 2021, : 198 - 203
  • [27] Building a Viable Information Security Management System
    Goldes, Sabine
    Schneider, Ralf
    Schweda, Christian M.
    Zamani, Jawed
    [J]. 2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 73 - 78
  • [28] An integrated system theory of information security management
    Hong, Kwo-Shing
    Chi, Yen-Ping
    Chao, Louis R.
    Tang, Jih-Hsing
    [J]. Information Management and Computer Security, 2003, 11 (05): : 243 - 248
  • [29] A system dynamics model for information security management
    Nazareth, Derek L.
    Choi, Jae
    [J]. INFORMATION & MANAGEMENT, 2015, 52 (01) : 123 - 134
  • [30] Information system security management in the new millennium
    Dhillon, G
    Backhouse, J
    [J]. COMMUNICATIONS OF THE ACM, 2000, 43 (07) : 125 - 128