A case study on the security audit methodologies in the context of information system's life cycle

被引:0
|
作者
Kim, J [1 ]
Hong, K [1 ]
机构
[1] Chung Ang Univ, Dept Informat Syst, Ansung, Kyunggi, South Korea
关键词
information security audit; information system security; process evaluation; control evaluation and information security evaluation;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Current information security management and audit methods are not effective enough to meet the increased corporate needs on information security. This paper attempts to compare, analyze, and apply to case study, some security audit and evaluation methods of Korea and other countries. In Korea, there is the Information Systems Security/Control Audit Guideline of NCA and the Information Security Management Systems Certification Guideline of KISA for information security audit. The SSE-CCM, BS 7799, NIST SP 800-26, and the ISG of ISACA are some of the better known criteria in other countries. The Information Systems Security/Control Audit Guideline of NCA, SSE-CCM and the ISG of ISACA are the process evaluation methods and the Information Security Management Systems Certification Guideline of KISA, BS 7799 and NIST SP 800-26 are the control evaluation methods. Based on application of the two major methods to a Korean case company, we conclude that process evaluation method needs to be more detailed and control evaluation method needs a modification of the levels of evaluation.
引用
收藏
页码:38 / 43
页数:6
相关论文
共 50 条
  • [21] Survey: Security in the system development life cycle
    Amer, SH
    Humphries, JW
    Hamilton, JA
    [J]. PROCEEDINGS FROM THE SIXTH ANNUAL IEEE SYSTEMS, MAN AND CYBERNETICS INFORMATION ASSURANCE WORKSHOP, 2005, : 310 - 316
  • [22] An improved algorithm of pattern matching for information security audit system
    School of Physics Science and Information Engineering, Jishou University, Jishou 416000, China
    不详
    不详
    [J]. J. Comput. Inf. Syst., 2008, 5 (2221-2228):
  • [23] Design and Implementation of Cluster Monitoring on Information Security Audit System
    Shao, Zuozhi
    Zeng, Geng
    Gong, Rui
    Li, Yunpeng
    Zhang, Kuo
    [J]. PROCEEDINGS OF 2015 6TH IEEE INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE, 2015, : 718 - 721
  • [24] A FIELD EXAMINATION OF SYSTEM LIFE-CYCLE TECHNIQUES AND METHODOLOGIES
    PALVIA, P
    NOSEK, JT
    [J]. INFORMATION & MANAGEMENT, 1993, 25 (02) : 73 - 84
  • [25] A life-cycle model of information system security engineering based on SSE-CMM
    Wang, XF
    Li, YJ
    [J]. PROCEEDINGS OF 2002 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE & ENGINEERING, VOLS I AND II, 2002, : 238 - 242
  • [26] Life Cycle Analysis of Study Projects in "Projects Cloud" Information System
    Kazeeva, M. A.
    Chepurov, E. G.
    Medvedeva, M. A.
    Berg, D. B.
    Spassov, K. B.
    [J]. INTERNATIONAL CONFERENCE ON NUMERICAL ANALYSIS AND APPLIED MATHEMATICS (ICNAAM-2018), 2019, 2116
  • [27] Understanding cyberbullying as an information security attack—life cycle modeling
    Patricio Zambrano
    Jenny Torres
    Ángel Yánez
    Alexandra Macas
    Luis Tello-Oquendo
    [J]. Annals of Telecommunications, 2021, 76 : 235 - 253
  • [28] Limitations of the Information Security Management System Assessment Approaches in the Context of Information Security Policy Assessment
    Corpuz, Maria Soto
    [J]. WMSCI 2010: 14TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV (POST-CONFERENCE EDITION), 2010, : 148 - 150
  • [29] Thermoeconomic and life cycle assessments for a trigeneration system: A case study
    Silva, Elias Gabriel Magalhaes
    de Sousa, Maria Helena
    Carvalho, Monica
    Marques, Adriano da Silva
    [J]. ENERGY SOURCES PART A-RECOVERY UTILIZATION AND ENVIRONMENTAL EFFECTS, 2023, 45 (03) : 7529 - 7543
  • [30] Integrated knowledge and information audit: a case study
    Gonzalez Guitian, Maria Virginia
    de Zayas Perez, Maria Rosa
    Martinez Rios, Marcos Antonio
    [J]. REVISTA GENERAL DE INFORMACION Y DOCUMENTACION, 2016, 26 (01): : 43 - 64