IMPLEMENTATION OF INFORMATION SECURITY MANAGEMENT SYSTEM

被引:0
|
作者
Drastich, Martin [1 ]
机构
[1] Tech Univ Ostrava, Fac Econ, Ostrava 70121, Czech Republic
关键词
information security management system; information security; security policy; security management;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
An ISMS is a newly used conception that includes a sum of all requirements and measures. It is defined as a set of measures and requirements in order to secure protection and security of all important corporate assets, i.e. information, know-how, property and persons that is implemented according to the recognized international standard (ISO / IEC 27001 : 2005 in Czech Republic CSN ISO / IEC 27001 : 2006). The very implementation of information security management system is not either simple or cheap matter. In this paper a procedure in individual steps has been suggested which will methodically lead to and facilitate the very implementation - from a decision made on the ISMS implementation by the management up to a certification awarded by an independent certification authority.
引用
收藏
页码:49 / 55
页数:7
相关论文
共 50 条
  • [21] Study and implementation of urban rail transit construction engineering security and risk management information system
    Liao, Yi-qi
    Jin, Huai
    Lv, Pei-yin
    Li, Jun-wei
    INFORMATION TECHNOLOGY IN GEO-ENGINEERING, 2010, : 433 - 441
  • [22] Integrated Implementation of Service and Information Security Management System (case study: State Polytehnic of Lampung)
    Putra, Septafiansyah Dwi
    Sutikno, Sarwono
    Rosmansyah, Yusep
    Asrowardi, Imam
    2014 INTERNATIONAL CONFERENCE ON ICT FOR SMART SOCIETY (ICISS), 2014, : 185 - 191
  • [23] Research on the Implementation Method of Database Security in Management Information System Based on Big Data Analysis
    Chen, Qunlin
    2020 INTERNATIONAL CONFERENCE ON ENERGY, ENVIRONMENT AND BIOENGINEERING (ICEEB 2020), 2020, 185
  • [24] INFORMATION SECURITY MANAGEMENT SYSTEM AND CYBER SECURITY IN THE CZECH REPUBLIC
    Drastich, Martin
    ZNALOSTI PRO TRZNI PRAXI 2015: ZENY - PODNIKATELKY V MINULOSTI A SOUCASNOSTI, 2015, : 85 - 90
  • [26] The Design of Information Security Management System in College
    Li, Xinli
    INTERNATIONAL CONFERENCE ON EDUCATION & EDUCATIONAL RESEARCH AND ENVIRONMENTAL STUDIES (EERES 2016), 2016, : 49 - 52
  • [27] Building a Viable Information Security Management System
    Goldes, Sabine
    Schneider, Ralf
    Schweda, Christian M.
    Zamani, Jawed
    2017 3RD IEEE INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2017, : 73 - 78
  • [28] The Measurement Design of Information Security Management System
    Nancylia, Merry
    Mudjtabar, Eddy K.
    Sutikno, Sarwono
    Rosmansyah, Yusep
    2014 8TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATION SYSTEMS SERVICES AND APPLICATIONS (TSSA), 2014,
  • [29] An integrated system theory of information security management
    Hong, Kwo-Shing
    Chi, Yen-Ping
    Chao, Louis R.
    Tang, Jih-Hsing
    Information Management and Computer Security, 2003, 11 (05): : 243 - 248
  • [30] A system dynamics model for information security management
    Nazareth, Derek L.
    Choi, Jae
    INFORMATION & MANAGEMENT, 2015, 52 (01) : 123 - 134