Journal articles on the topic 'IEC 27004'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'IEC 27004.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Winarni, Ade. "Penilaian Tingkat Efektivitas Penerapan Keamanan Sistem Informasi Menggunakan Iso/Iec 27004:2009 Dan Iso/Sni 27001:2009 (Studi." Jurnal Bangkit Indonesia 5, no. 2 (2016): 90. http://dx.doi.org/10.52771/bangkitindonesia.v5i2.77.
Full textSoesanto, Edy, Fadila Kurniasih, Putri Mutiara, and Salsabila Taqwaning Afifi. "Sistem manajemen keamanan informasi dengan standar ISO/IEC 27001 dan ISO/ICE 27002 pada PT Jasa Marga." Co-Creation : Jurnal Ilmiah Ekonomi Manajemen Akuntansi dan Bisnis 1, no. 4 (2023): 155–64. http://dx.doi.org/10.55904/cocreation.v1i4.700.
Full textDisterer, Georg. "ISO/IEC 27000, 27001 and 27002 for Information Security Management." Journal of Information Security 04, no. 02 (2013): 92–100. http://dx.doi.org/10.4236/jis.2013.42011.
Full textAdebola Folorunso, Viqaruddin Mohammed, Ifeoluwa Wada, and Bunmi Samuel. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. http://dx.doi.org/10.30574/wjarr.2024.24.1.3169.
Full textAldya, A. P., S. Sutikno, and Y. Rosmansyah. "Measuring effectiveness of control of information security management system based on SNI ISO/IEC 27004: 2013 standard." IOP Conference Series: Materials Science and Engineering 550 (August 23, 2019): 012020. http://dx.doi.org/10.1088/1757-899x/550/1/012020.
Full textAdebola, Folorunso, Mohammed Viqaruddin, Wada Ifeoluwa, and Samuel Bunmi. "The impact of ISO security standards on enhancing cybersecurity posture in organizations." World Journal of Advanced Research and Reviews 24, no. 1 (2024): 2582–95. https://doi.org/10.5281/zenodo.15063305.
Full textFatih, Dayyan, and Rizal Fathoni Aji. "Evaluasi Keamanan Informasi Menggunakan ISO/IEC 27001: Studi Kasus PT XYZ." J-SAKTI (Jurnal Sains Komputer dan Informatika) 8, no. 1 (2024): 72. https://doi.org/10.30645/j-sakti.v8i1.767.
Full textRobayo Jácome, Darío Javier, Priscila Aguilar-Molina, and Lorena del Carmen Chiliquinga Véjar. "Information Security through the ISO/IEC 27001:2013 Standard." Medwave 23, S1 (2023): eUTA275. http://dx.doi.org/10.5867/medwave.2023.s1.uta275.
Full textRamazonova, Madina Shavkatovna, Shuxratbek Dilmurodjon o'g'li Tojimuratov, Bekzod Toxirboy o'g'li Mirzayev та Jaloliddin Umidjon o'g'li Babajanov. "ISO/IEC 27001:2005 VA ISO/IEC 17799:2005 STANDARTLARI. "AXBOROT TEXNOLOGIYALARI. XAVFSIZLIKNI TAʼMINLASH METODLARI. AXBOROT XAVFSIZLIGINI BOSHQARISH TIZIMLARI."". RESEARCH AND EDUCATION 3, № 4 (2024): 183–91. https://doi.org/10.5281/zenodo.11245256.
Full textBuresh, Ph.D., J.D., LL.M., Donald L. "A Practical Evaluation of Remote Work Issues and the SolarWinds Breach Using the ISO/IEC 27001 Cybersecurity Framework and the ISO/IEC 27002 Guidelines." Studies in Social Science Research 3, no. 2 (2022): p75. http://dx.doi.org/10.22158/sssr.v3n2p75.
Full textAntipov, V. E., and V. V. Selifanov. "Problems of formalization of ISMS processes." Interexpo GEO-Siberia 6 (May 18, 2022): 3–8. http://dx.doi.org/10.33764/2618-981x-2022-6-3-8.
Full textDiamantopoulou, Vasiliki, Aggeliki Tsohou, and Maria Karyda. "From ISO/IEC27001:2013 and ISO/IEC27002:2013 to GDPR compliance controls." Information & Computer Security 28, no. 4 (2020): 645–62. http://dx.doi.org/10.1108/ics-01-2020-0004.
Full textMendes, Ricardo Ribeiro, Rômulo R. L. de Oliveira, Anderson Fabiano Batista Ferreira da Costa, and Reinaldo Cezar De Morais Gomes. "Uma metodologia para implantação de um Sistema de Gestão de Segurança da Informação (SGSI) baseado nas normas ABNT NBR ISO/IEC 27001 e 27002." Revista Principia - Divulgação Científica e Tecnológica do IFPB, no. 22 (August 26, 2013): 69. http://dx.doi.org/10.18265/1517-03062015v1n22p69-80.
Full textال فيحان, اثير عبد الهادي, та عامر حمدي عبد غريب. "تقييم نظام أدارة امن المعلومات في الهيئة العراقية للحاسبات والمعلوماتية على وفق المواصفة الدولية (ISO/IEC 27001:2013". Journal of Economics and Administrative Sciences 21, № 86 (2015): 1. http://dx.doi.org/10.33095/jeas.v21i86.764.
Full textSugianto, Anindya Dwi Lestari, Febriliyan Samopa, and Hanim Maria Astuti. "PENILAIAN DAN KONTROL RISIKO TERHADAP INFRASTRUKTUR DAN KEAMANAN INFORMASI BERDASARKAN STANDAR ISO/IEC 27001:2013 (STUDI KASUS: INSTITUT TEKNOLOGI SEPULUH NOPEMBER)." Sebatik 24, no. 1 (2020): 96–101. http://dx.doi.org/10.46984/sebatik.v24i1.910.
Full textHermawan, Wawan. "Perancangan Manajemen Risiko Keamanan Informasi pada Penyelenggara Sertifikasi Elektronik (PSrE)." Jurnal Telekomunikasi dan Komputer 9, no. 2 (2019): 129. http://dx.doi.org/10.22441/incomtech.v9i2.6474.
Full textMauladani, Furqon, and Daniel Oranova Siahaan. "Perancangan SMKI Berdasarkan SNI ISO/IEC27001:2013 dan SNI ISO/IEC27005:2013 (Studi Kasus DPTSI-ITS)." CSRID (Computer Science Research and Its Development Journal) 10, no. 1 (2018): 32. http://dx.doi.org/10.22303/csrid.10.1.2018.32-43.
Full textBlandón Jaramillo, Carlos Arturo, and Alejandra María Benavides Sepúlveda. "Modelo sistema de gestión de seguridad de la información para instituciones educativas de nivel básico." Scientia et Technica 23, no. 1 (2018): 85–92. http://dx.doi.org/10.22517/23447214.15861.
Full textPrimaranti, Jenyta, Aulia Faradilla Setyowardhani, Ida Nurlela, Valerian Ghrandiaz, and Yulhendri Yulhendri. "Analisis Resiko Keamanan Informasi Website Repository Digital Library Menggunakan Framework ISO/IEC 27001 & 27002: Studi Kasus Perguruan tinggi X." Jurnal Riset Multidisiplin dan Inovasi Teknologi 2, no. 01 (2023): 327–73. http://dx.doi.org/10.59653/jimat.v2i01.500.
Full textFauzi, Rokhman. "Implementasi Awal Sistem Manajemen Keamanan Informasi pada UKM Menggunakan Kontrol ISO/IEC 27002." JTERA (Jurnal Teknologi Rekayasa) 3, no. 2 (2018): 145. http://dx.doi.org/10.31544/jtera.v3.i2.2018.145-156.
Full textÁvila Coello, Alex Armando. "Modelo de SGSI en el Departamento de TI del GADMCN, Aplicando Controles ISO/IEC 27001:2013 e ISO/IEC 27002:2022." Ciencia Latina Revista Científica Multidisciplinar 8, no. 5 (2024): 12000–11210. http://dx.doi.org/10.37811/cl_rcm.v8i5.14503.
Full textPumasunco Rivera, Manuel Fernando, and Candy Esther Seminario Sanchez. "La seguridad de la información y los beneficios de la Norma ISO/IEC 27002:2013." Revista de investigación de Sistemas e Informática 17, no. 2 (2024): 45–49. https://doi.org/10.15381/risi.v17i2.29916.
Full textDamian Vasquez, Jaime. "ISO/IEC 27000." HIGH TECH-ENGINEERING JOURNAL 3, no. 2 (2023): 80–84. http://dx.doi.org/10.46363/high-tech.v3i2.3.
Full textNykänen, Riku, and Tommi Kärkkäinen. "Aligning Two Specifications for Controlling Information Security." International Journal of Cyber Warfare and Terrorism 4, no. 2 (2014): 46–62. http://dx.doi.org/10.4018/ijcwt.2014040104.
Full textMeitarice, Sonya, Lidya Febyana, Aidil Fitriansyah, Rahmad Kurniawan, and Riki Ario Nugroho. "Risk Management Analysis of Information Security in an Academic Information System at a Public University in Indonesia: Implementation of ISO/IEC 27005:2018 and ISO/IEC 27001:2013 Security Controls." Journal of Information Technology and Cyber Security 2, no. 2 (2024): 58–75. https://doi.org/10.30996/jitcs.12099.
Full textMedve, Anna. "Model-based Framework for Change Management and Integrated Development of Information Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (2013): 586–97. http://dx.doi.org/10.24297/ijmit.v5i3.4225.
Full textMedve, Anna. "Model-based Framework for Change Management and Integrated Devlopment of Information Security." INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY 5, no. 3 (2018): 586–97. http://dx.doi.org/10.24297/ijmit.v5i3.759.
Full textriswaya, Asep Ririh, Ashwin Sasongko, and Asep Maulana. "EVALUASI TATA KELOLA KEAMANAN TEKNOLOGI INFORMASI MENGGUNAKAN INDEKS KAMI UNTUK PERSIAPAN STANDAR SNI ISO/IEC 27001 (STUDI KASUS: STMIK MARDIRA INDONESIA)." Jurnal Computech & Bisnis 14, no. 1 (2020): 10–18. https://doi.org/10.5281/zenodo.3929041.
Full textTasa Catanzaro, María Elena, Henry George Maquera Quispe, John Fredy Rojas Bujaico, and Marjorie Gabriela del Carmen Delgado Rospigliosi. "Análisis de información de la gestión de incidentes de seguridad en organizaciones." PURIQ 4, no. 1 (2021): 14–30. http://dx.doi.org/10.37073/puriq.4.1.196.
Full textAkowuah, Francis, Xiaohong Yuan, Jinsheng Xu, and Hong Wang. "A Survey of Security Standards Applicable to Health Information Systems." International Journal of Information Security and Privacy 7, no. 4 (2013): 22–36. http://dx.doi.org/10.4018/ijisp.2013100103.
Full textKurii, Y., and I. Opirskyy. "OVERVIEW OF THE CIS BENCHMARKS USAGE FOR FULFILLING THE REQUIREMENTS FROM INTERNATIONAL STANDARD ISO/IEC 27001:2022." Computer systems and network 6, no. 1 (2024): 89–98. http://dx.doi.org/10.23939/csn2024.01.089.
Full textJoko Wibowo, Endro, and Kalamullah Ramli. "Impact of Implementation of Information Security Risk Management and Security Controls on Cyber Security Maturity (A Case Study at Data Management Applications of XYZ Institute)." Jurnal Sistem Informasi 18, no. 2 (2022): 1–17. http://dx.doi.org/10.21609/jsi.v18i2.1146.
Full textColoma-Baños, Nadia Carminia, Fredy Pablo Cañizares-Galarza, Ariel José Romero-Fernández, and Marco Vinicio Quintana-Cifuentes. "La seguridad informática para la toma de decisiones en el distrito de educación 12d03. Mocache-Ecuador." CIENCIAMATRIA 8, no. 4 (2022): 897–915. http://dx.doi.org/10.35381/cm.v8i4.898.
Full textLitvinchuk, Iryna, Ruslan Korchomnyi, Nataliia Korshun, and Maksym Vorokhob. "APPROACH TO INFORMATION SECURITY RISK ASSESSMENT FOR A CLASS «1» AUTOMATED SYSTEM." Cybersecurity: Education, Science, Technique 2, no. 10 (2020): 98–112. http://dx.doi.org/10.28925/2663-4023.2020.10.98112.
Full textChoi, Ju-Young, Eun-Jung Choi, and Myuhng-Joo Kim. "A Comparison Study between Cloud Service Assessment Programs and ISO/IEC 27001:2013." Journal of Digital Policy and Management 12, no. 1 (2014): 405–14. http://dx.doi.org/10.14400/jdpm.2014.12.1.405.
Full textApaza Chávez, Wilmer Aufredy. "Propuesta de un plan de seguridad de la información para incrementar la fiabilidad de datos en una financiera." Innovación y Software 2, no. 2 (2021): 27–43. http://dx.doi.org/10.48168/innosoft.s6.a39.
Full textNiemann, Karl-Heinz, and Pierre Kobes. "ISO 27000 oder IEC 62443?" atp magazin 66, no. 3 (2024): 60–67. http://dx.doi.org/10.17560/atp.v66i3.2706.
Full textMohammed, Mustafa Khan. "Examining ISO/IEC 27001 Standard." European Journal of Advances in Engineering and Technology 8, no. 1 (2021): 123–28. https://doi.org/10.5281/zenodo.13950913.
Full textKurnianto, Ari, Rizal Isnanto, and Aris Puji Widodo. "Assessment of Information Security Management System based on ISO/IEC 27001:2013 On Subdirectorate of Data Center and Data Recovery Center in Ministry of Internal Affairs." E3S Web of Conferences 31 (2018): 11013. http://dx.doi.org/10.1051/e3sconf/20183111013.
Full textBeirami, Nahid, Naser Modiri, and Abbas Toloie Eshlaghi. "Review the implementation of information security management system requirements in hospitals of Tabriz in East Azarbaijan." Journal of Management and Accounting Studies 4, no. 01 (2019): 72–77. http://dx.doi.org/10.24200/jmas.vol4iss01pp72-77.
Full textMukati Astitwa Bhargava, Adesh. "Comparative Study between PCI-DSS v4.0 and ISO/IEC 27001:2022." International Journal of Science and Research (IJSR) 12, no. 6 (2023): 2936–51. http://dx.doi.org/10.21275/sr23711142455.
Full textHunorfi, Péter. "Az ISO/IEC 27001 szabvány elmélete és gyakorlati alkalmazása OT/ICS-rendszerek kiberbiztonsági jelentéseinek tükrében." Scientia et Securitas 5, no. 3 (2024): 323–32. https://doi.org/10.1556/112.2024.00228.
Full textSinaga, Rudolf, and Frangky Taan. "Penerapan ISO/IEC 27001:2022 dalam Tata Kelola Keamanan Sistem Informasi: Evaluasi Proses dan Kendala." NUANSA INFORMATIKA 18, no. 2 (2024): 46–54. http://dx.doi.org/10.25134/ilkom.v18i2.205.
Full textKusnandar, Aris. "Evaluasi Keamanan Sistem Informasi Menggunakan Fuzzy FMEA Berbasis Framework ISO/IEC 27001:2013 untuk Meningkatkan Keamanan Informasi." Jurnal Sistem Informasi Bisnis 14, no. 2 (2024): 181–90. http://dx.doi.org/10.21456/vol14iss2pp181-190.
Full textMusyarofah, Sitta Rif’atul, and Rahadian Bisma. "Analisis kesenjangan sistem manajemen keamanan informasi (SMKI) sebagai persiapan sertifikasi ISO/IEC 27001:2013 pada institusi pemerintah." Teknologi 11, no. 1 (2021): 1–15. http://dx.doi.org/10.26594/teknologi.v11i1.2152.
Full textSindi Aprianti, Renny Puspita Sari, and Ibnur Rusi. "Manajemen Risiko Keamanan Simbada Menggunakan Metode NIST SP 800-30 Revisi 1 dan Kontrol ISO/IEC 27001:2013." Jurnal Buana Informatika 14, no. 01 (2023): 50–59. http://dx.doi.org/10.24002/jbi.v14i01.7043.
Full textRasyid, Rizky Muhamad, and Rizal Fathoni Aji. "Perancangan Manajemen Risiko Keamanan Informasi Menggunakan SNI ISO/IEC 27005: Studi Kasus Integrated School Management System milik PT XYZ." Jurasik (Jurnal Riset Sistem Informasi dan Teknik Informatika) 10, no. 1 (2025): 226. https://doi.org/10.30645/jurasik.v10i1.866.
Full textJendrian, Kai. "Der Standard ISO/IEC 27001:2013." Datenschutz und Datensicherheit - DuD 38, no. 8 (2014): 552–57. http://dx.doi.org/10.1007/s11623-014-0182-x.
Full textPordesch, Ulrich. "DIN ISO/IEC 27001-orientiertes ISMS." Datenschutz und Datensicherheit - DuD 41, no. 11 (2017): 667–71. http://dx.doi.org/10.1007/s11623-017-0855-3.
Full textHandro, Fedro Ali, Alwi Azis Mahendra, and Megawati. "Evaluasi Tingkat Kesiapan Keamanan Informasi Menggunakan Indeks Keamanan Informasi (Indeks Kami) Versi 5.0 pada Diskominfo XYZ." Journal Informatics Nivedita 1, no. 2 (2025): 141–49. https://doi.org/10.25078/nivedita.v1i2.4501.
Full text