A case study on the security audit methodologies in the context of information system's life cycle

被引:0
|
作者
Kim, J [1 ]
Hong, K [1 ]
机构
[1] Chung Ang Univ, Dept Informat Syst, Ansung, Kyunggi, South Korea
关键词
information security audit; information system security; process evaluation; control evaluation and information security evaluation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current information security management and audit methods are not effective enough to meet the increased corporate needs on information security. This paper attempts to compare, analyze, and apply to case study, some security audit and evaluation methods of Korea and other countries. In Korea, there is the Information Systems Security/Control Audit Guideline of NCA and the Information Security Management Systems Certification Guideline of KISA for information security audit. The SSE-CCM, BS 7799, NIST SP 800-26, and the ISG of ISACA are some of the better known criteria in other countries. The Information Systems Security/Control Audit Guideline of NCA, SSE-CCM and the ISG of ISACA are the process evaluation methods and the Information Security Management Systems Certification Guideline of KISA, BS 7799 and NIST SP 800-26 are the control evaluation methods. Based on application of the two major methods to a Korean case company, we conclude that process evaluation method needs to be more detailed and control evaluation method needs a modification of the levels of evaluation.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [1] The Study on the Information Security Audit Guideline for SCADA System
    Lee, ChulSoo
    Hong, Seng-phil
    Kang, Sungmin
    Kim, Jaehyoun
    [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2009, 12 (01): : 147 - 162
  • [2] Study on Business-oriented Information Security Audit System
    Zheng, Tianxiang
    Zhou, Yiming
    [J]. 2012 2ND INTERNATIONAL CONFERENCE ON APPLIED SOCIAL SCIENCE (ICASS 2012), VOL 3, 2012, : 264 - +
  • [3] A Security Audit Framework to Manage Information System Security
    Pereira, Teresa
    Santos, Henrique
    [J]. GLOBAL SECURITY, SAFETY, AND SUSTAINABILITY, 2010, 92 : 9 - +
  • [4] The Fourth Dimension of Information System Audit and Security
    Aggarwal, Akshai
    Kanhere, Sujata
    Kanhere, Vishnu
    Kanhere, Shankar
    [J]. SEPADS'09: PROCEEDINGS OF THE 8TH WSEAS INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SOFTWARE ENGINEERING, PARALLEL AND DISTRIBUTED SYSTEMS, 2009, : 162 - +
  • [5] AUDIT AND INFORMATION SECURITY MANAGEMENT SYSTEM CERTIFICATION
    Drastich, Martin
    [J]. SBORNIK Z MEZINARODNI VEDECKE KONFERENCE ZNALOSTI PRO TRZNI PRAXI 2012: VYZNAM ZNALOSTI V AKTUALNI FAZI EKONOMICKEHO CYKLU, 2012, : 49 - 52
  • [6] An Information Security Policy Development Life Cycle
    Tuyikeze, T.
    Pottas, D.
    [J]. PROCEEDINGS OF THE SOUTH AFRICAN INFORMATION SECURITY MULTI-CONFERENCE, 2010, : 165 - 176
  • [8] Open Source Security Information Management System Supporting IT Security Audit
    Hermanowski, Damian
    [J]. 2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 336 - 341
  • [9] Information System Audit for Mobile Device Security Assessment
    Abu Othman, Noor Ashitah
    Norman, Azah Anir
    Kiah, Miss Laiha Mat
    [J]. 2021 3RD INTERNATIONAL CYBER RESILIENCE CONFERENCE (CRC), 2021, : 50 - 55
  • [10] Security Audit of a University Information System: A Functional Model
    Kan, Andrei
    Albatsha, Ahmad
    [J]. SOFTWARE ENGINEERING PERSPECTIVES IN SYSTEMS, VOL. 1, 2022, 501 : 557 - 564