Dissertations / Theses on the topic 'Information security, information security management system, ISMS'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Information security, information security management system, ISMS.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Erkan, Ahmet. "An Automated Tool For Information Security Management System." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607783/index.pdf.
Full textInfoSec Toolkit&rdquo
, which is developed for this purpose in the thesis scope, is given. &ldquo
InfoSec Toolkit&rdquo
is based on ISO/IEC 27001:2005 and ISO 17799:2005. Five basic integrated modules constituting the &ldquo
InfoSec Toolkit&rdquo
are &ldquo
Gap Analysis Module&rdquo
, &ldquo
Risk Module&rdquo
, &ldquo
Policy Management Module&rdquo
, &ldquo
Monitoring Module&rdquo
and &ldquo
Query and Reporting Module&rdquo
. In addition a research framework is proposed in order to assess the public and private organizations&rsquo
information security situation in Turkey.
Trunkát, Jan. "Návrh zavedení ISMS ve firmě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-225000.
Full textAsp, Sandin Agnes. "A simplified ISMS : Investigating how an ISMS for a smaller organization can be implemented." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20238.
Full textShoraka, Babak. "An Empirical Investigation of the Economic Value of Information Security Management System Standards." NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/304.
Full textHavlík, Michal. "Návrh průmyslového řešení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318610.
Full textTomko, Michal. "Návrh zavedení bezpečnostních opatření na základě ISMS pro malý podnik." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-402087.
Full textDočekal, Petr. "Návrh zavedení bezpečnostních opatření v souladu s ISMS pro obchodní společnost." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378344.
Full textKuchařík, Lukáš. "Návrh ISMS v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241472.
Full textDokoupil, Ondřej. "Návrh metodiky pro zavedení ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-254270.
Full textKameníček, Lukáš. "Návrh systém managementu ISMS." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2011. http://www.nusl.cz/ntk/nusl-229425.
Full textDejmek, Martin. "Zavedení ISMS v obchodní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224221.
Full textŠebrle, Petr. "Zavedení ISMS do podniku podporujícího kritickou infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318630.
Full textKulhánek, Radek. "Návrh na zavedení průmyslového řešení ISMS ve výrobní společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241566.
Full textKosek, Jindřich. "Zavedení ISMS v malém podniku se zaměřením na ICT infrastrukturu." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224444.
Full textBukovský, Luděk. "Návrh zavedení bezpečnostních opatření podle ISMS ve společnosti vyvíjející finanční aplikaci." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399318.
Full textPawlik, Jan. "Zavedení ISMS v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224837.
Full textPalarczyk, Vít. "Zavedení ISMS v malém podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2015. http://www.nusl.cz/ntk/nusl-224894.
Full textJemelíková, Kristýna. "Kyberbezpečnost v průmyslu." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-449730.
Full textKalabis, Petr. "Management informační bezpečnosti v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241646.
Full textKryštof, Tomáš. "Návrh na zavedení nutných oblastí ISMS na základní škole." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241476.
Full textHajný, Jiří. "Management informační bezpečnosti ve zdravotnickém zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2014. http://www.nusl.cz/ntk/nusl-224498.
Full textŠtukhejl, Kamil. "Návrh zavedení ISMS ve veřejné správě." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2019. http://www.nusl.cz/ntk/nusl-399673.
Full textKadlec, Miroslav. "Návrh řízení informační bezpečnosti v průmyslovém prostředí." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378336.
Full textKubík, Lukáš. "Informační bezpečnost jako jeden z ukazatelů hodnocení výkonnosti v energetické společnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318305.
Full textLukeš, Pavel. "Implementace nových koncových uzlů do firmy a jejich management." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241594.
Full textŠumbera, Adam. "Zavedení managementu bezpečnosti informací v podniku dle ISO 27001." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224217.
Full textFévrier, Rémy. "Management de la sécurité des systèmes d'information : les collectivités territoriales face aux risques numériques." Thesis, Paris 2, 2012. http://www.theses.fr/2012PA020025.
Full textThis doctoral thesis aims at answering a key question: what is the level of consideration given to Information Systems Security (ISS) by the French local authorities (LAs)? The latter are now facing new challenges that require an ever-increasing use of new technologies (e-government, e-democracy, dematerialization of call for tenders...). The under-researched territorial IT risk becomes a major issue in the sphere of public services and the protection of personal data. Theoretically based and constructed through successive professional positions, our theoretical model helps measure the actual level of inclusion of digital risk taking into account the respective influence of a set of characteristics of local authorities. A field survey was conducted with the close collaboration of representatives of LAs.While numerical risk requires a high level awareness by LA decision makers, it appears that they have a very imperfect knowledge of IT security related risks as well as of direct or indirect threats that may jeopardize their management systems. A potential solution lies with the definition of a specific public policy and with the implementation of appropriate procedures at the level of each community
Hruška, David. "Návrh změn identity managementu v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2018. http://www.nusl.cz/ntk/nusl-378329.
Full textPospíchal, Jindřich. "Zavedení ISMS v podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2016. http://www.nusl.cz/ntk/nusl-241309.
Full textMahmood, Ashrafullah Khalid. "Information Security Management of Healthcare System." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4353.
Full textmuqadas@gmail.com
Sharma, Dhirendra S. M. Massachusetts Institute of Technology. "Enterprise Information Security Management Framework [EISMF]." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/67568.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (p. 124-130).
There are several technological solutions available in the market to help organizations with information security breach detection and prevention such as intrusion detection and prevention systems, antivirus software, firewalls, and spam filters. There is no doubt in the fact that significant progress has been made in the technological side of information security. However, when we study causes of information security breaches, we find that a significant number are caused by non-technical reasons such as social engineering, theft of computing device or portable hard drive, human behavior, and human error. This leads us to conclude that information security should not be viewed through technology perspective only. Instead, a more holistic approach is required. This thesis provides a systems approach towards information security management and include technological, management and social aspects. This thesis starts with introduction especially background and motivation of the author, followed by literature research. Next, Enterprise Information Security Management Framework is presented leading to estimation of an organization's information security management maturity-level. Finally, conclusion and potential future work are presented.
by Dhirendra Sharma.
S.M.in Engineering and Management
Nemec, Tomáš. "Návrh metodiky pro příručku ISMS a opatření aplikované na vybrané oblasti." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-224225.
Full textColes-Kemp, Elizabeth. "The anatomy of an information security management system." Thesis, King's College London (University of London), 2008. https://kclpure.kcl.ac.uk/portal/en/theses/the-anatomy-of-an-information-security-management-system(08ef0714-a5aa-4b6e-b322-8a174da6a2b9).html.
Full textHe, Ying. "Generic security templates for information system security arguments : mapping security arguments within healthcare systems." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5773/.
Full textMonzelo, Pedro Miguel Centúrio Sol. "A função do Chief Information Security Officer nas organizações." Master's thesis, Instituto Superior de Economia e Gestão, 2018. http://hdl.handle.net/10400.5/17568.
Full textNum mundo cada vez mais conectado e digital, a informação é crescentemente vista como potenciador do negócio e fonte de vantagem competitiva. Assim, a segurança de informação torna-se crítica ao proteger os ativos de informação, pelo que a estratégia de segurança organizacional tem vindo a alinhar-se com os seus objetivos de negócio. Por outro lado, as recentes alterações legais, tais como a Diretiva Segurança das Redes e da Informação e o Regulamento Geral de Proteção de Dados, vêm impor regras relativamente à privacidade e à segurança da informação, permitindo às organizações um redesenho ou ajuste dos seus processos de forma a garantir que a informação se encontra efetivamente segura. Neste contexto, o Chief Information Security Officer assume um papel de destaque na coordenação da confidencialidade, integridade e disponibilidade da informação na organização. Este trabalho pretende estudar o ambiente geral da segurança de informação nas organizações, analisar o papel do CISO, e compreender onde este deverá estar integrado na estrutura organizacional. Para tal, foram realizadas entrevistas a consultores especialistas e a pessoas com cargos diretivos nas áreas de sistemas de informação e de segurança da informação, que permitiram concluir que ainda é necessário um grande amadurecimento a nível das organizações em Portugal relativamente ao tema, e que tal poderá dever-se à ausência de uma cultura de segurança estabelecida no país. Por outro lado, o papel do CISO tem assumido uma maior relevância, sendo que é uma opinião geral que o mesmo deverá ter uma relação próxima com a administração das organizações.
In an increasingly connected and digital world, information is seen as a business enabler and a source of sustained competitive advantage. Thus, information security is becoming critical so to protect these information assets, which is why the concern with organizations’ security strategy has been aligning with their strategic objectives. On the other hand, recent changes in regulation, as Network and Information Security (NIS) directive and the General Data Protection Regulation (GDPR), come to regulate and create rules when it comes to information security, and allow organizations to redesign or adjust these processes in order to ensure that information is, in fact, safe. In this context, the Chief Information Security Officer (CISO) comes to play an important role in coordinating confidentiality, integrity, and availability of information in the organization. This paper aims to study organizations’ information security environment in general, analyse the CISO’s role inside them, and understand where they should be integrated in the corporate structure. To do so, interviews were conducted on experienced information security consultants and information systems and information security directors, which allowed to conclude that organizations in Portugal still need a great amount of maturing when it comes to information security, and that this may eventually be due to the absence of an established security culture in the country. On the other hand, the CISO’s role has been increasing in relevance, being a general opinion that their relationship with organizations’ boards should be close.
info:eu-repo/semantics/publishedVersion
Altamirano, Peter. "Zavedenie systému riadenia informačnej bezpečnosti v malom podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223974.
Full textFarahmand, Fariborz. "Developing a Risk Management System for Information Systems Security Incidents." Diss., Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/7600.
Full textGancarčik, Rastislav. "Informační bezpečnost jako ukazatel výkonnosti podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2017. http://www.nusl.cz/ntk/nusl-318349.
Full textTyali, Sinovuyo. "An integrated management system for quality and information security in healthcare." Thesis, Nelson Mandela Metropolitan University, 2012. http://hdl.handle.net/10948/d1006670.
Full textAnsen, Jerry Bature. "Information Security Management in a Human Resource Information System of a Selected University of Technology." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1768.
Full textThe study aimed to determine the information security management challenges in information systems (IS). The human resources department (HRD) of a selected university of technology (UoT) was used as a case study to investigate employee appointment processes data and its security management challenges. The unit of study was the human resource infomation system (HRIS) as a form of IS. An interpretive case-study approach and questionnaires were employed to support data gathering. Information gathered and managed by HRD during and after an employee’s appointment is vital to the institution. The rationale for this study therefore eminated from ongoing concerns in respect of ineffective information security in organisations, resulting in substantial losses. From the literature reviewed a conceptual framework was developed and used to guide the data analysis and interpretation of data. The research findings were further used to validate the conceptual framework. This was done to create a general framework, whereby the conclusions and recommendations from the data analysis and information security practices could enhance information security management in human resource systems at a university of technology.
Al-Hamar, Aisha. "Enhancing information security in organisations in Qatar." Thesis, Loughborough University, 2018. https://dspace.lboro.ac.uk/2134/33541.
Full textHassebroek, Pamela Burns. "Institutionalized Environments and Information Security Management: Learning from Y2K." Diss., Available online, Georgia Institute of Technology, 2007, 2007. http://etd.gatech.edu/theses/available/etd-06192007-111256/.
Full textRogers, Juan D., Committee Chair ; Klein, Hans K., Committee Member ; Bolter, Jay David, Committee Member ; Nelson-Palmer, Mike, Committee Member ; Kingsley, Gordon, Committee Member.
Dubuc, Clémence. "A Real- time Log Correlation System for Security Information and Event Management." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300452.
Full textKorrelation av flera händelser under en viss tidsperiod är en nödvändighet för plattformen för hotdetektering. När det gäller attacker i flera steg (attacker som kännetecknas av en sekvens av utförda kommandon) gör det möjligt att upptäcka de olika stegen ett efter ett och korrelera dem för att utlösa en varning. Den gör det också möjligt att upptäcka onormala beteenden i IT- systemet, t.ex. flera misstänkta åtgärder som utförs av samma konto. Korrelationen av säkerhetshändelser ökar systemets säkerhet och minskar antalet falska positiva upptäckter. Korrelationen av händelserna görs tack vare redan existerande korrelationsregler. Målet med den här avhandlingen är att utvärdera genomförbarheten av en korrelationsmotor baserad på Apache Spark. Det är nödvändigt att ändra det nuvarande korrelationssystemet eftersom det inte är skalbart, det kan inte hantera alla inkommande data och det kan inte utföra vissa typer av korrelation, t.ex. aggregering av händelserna efter attribut eller beräkning av kardinaliteten. Det nya är att förbättra systemets prestanda och korrelationskapacitet. I detta projekt föreslås två system för korrelering av händelser. Det första bygger på Apache Spark Structured Streaming och analyserade flödet av säkerhetsloggar i realtid. Eftersom resultaten inte var tillfredsställande har ett andra system införts. Det använder ett mer traditionellt tillvägagångssätt genom att lagra loggarna i ett Elastic Searchkluster och göra korrelationsförfrågningar på dem. I slutändan kan de två systemen korrelera plattformens loggar. Det system som bygger på Apache Spark använder dock för många resurser per korrelationsregel och det är för dyrt att starta hundratals korrelationsförfrågningar samtidigt. Av dessa skäl föredras systemet baserat på Elastic Search och det implementeras i arbetsflödet.
Barton, Kevin Andrew. "Information System Security Commitment: A Study of External Influences on Senior Management." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/19.
Full textSvensson, Gustav. "Auditing the Human Factor as a Part of Setting up an Information Security Management System." Thesis, KTH, Industriella informations- och styrsystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-119528.
Full textKuo, Mei-Show, and 郭美秀. "Exploring Campus Information Security Management Using COBIT and ISMS-A Case Study on Campus Information Systems of Some Junior High School in Taichung City." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/92xf4m.
Full text大葉大學
管理學院碩士在職專班
102
As the information technology advances, human life has been inextricably linked with the Internet. The institutions of government and enterprises require information systems to maintain the organizational operations through the Internet, and the campus information systems also do so. For instance, the scores and personal data of students must be uploaded to the campus systems, and the security of these data must be emphasized seriously. This shows the significance of campus information systems security. This research will combine the standard of COBIT process and the structure of ISMS procedure. Through the in-depth case interviews with the users of the campus information systems, we will derive the processes of the information security system for junior high schools in Taiwan, which can be used to enhance the campus information security according to the related countermeasures and suggestions.
Cho, Yi-Ting, and 卓奕廷. "Techniques and applications of ISMS (Information Security Management)-based Automatic Risk Assessment." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/tz2z47.
Full text元智大學
資訊工程學系
104
With the popularity and rapid development of information technology, information security has become an issue that can't be ignored. In recent years, major domestic and international information security incidents happened one after another, resulting in significant losses for many organizations. The impact of these incidents has been even extended to the level of the security of entire country. Many countries have realized the importance of information security, in particular the issue of security for critical information infrastructure. ISO adopted Information Security Management System (ISMS) standard series in 2000. ISO aims to protect the confidentiality, integrity and availability of organization information thourgh ISMS. By using risk analysis, evaluation and processing steps, the organization can achieve security control, and reduce the occurrences and impacts of information security incidents, and thus, improve the organization's information security. However, past research has not established any automatic mechanism for more objective risk evaluation to indicate the actual risk. This study, based on Information Security Management System framework, analyzes the feasibility and techniques of automatic risk evaluation. A case study of a recording center of a un-named large company is used to show the use and effectiveness of the proposed method. The advantages of automation include the following: it is a systematic, repeatable approach to detect potentially hidden / unobvious problems which can not be detected by humans. Thus, the proposed automation can improve the quality of information security management.
Venter, Diederik Petrus. "Infosure: an information security management system." Thesis, 2008. http://hdl.handle.net/10210/520.
Full textProf. S.H. Solms
Lei, Cheng-Chiu, and 雷誠久. "Information Security Management System for the Hospital." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/3fyzjb.
Full text國立東華大學
資訊工程學系
95
Digitalization jeopardizes information security wherever it is applied, and hospitals are not an exception. The information they possess is very personal, while the trust between the patient and the hospital is one basic factor for quality care. Therefore hospital information security and privacy are major issues that cannot be ignored. This research uses case study methods to observe and understand the information security management system of our research subject. We used a four point scoring survey that was developed on the basis of “ISO/IEC 27001”to develop models that could verify their information security management systems. Our research subject was the first hospital under the jurisdiction of the Department of Health and the first in Taiwan to receive an ISO/IEC 27001:2005 certificate. Therefore, their information security management is very good and can be viewed as a standard for others to follow. We have come up with some extremely constructive suggestions via our extensive research. These suggestions and experience will be presented to our hospital, provided to future researchers, and serve as reference for those that wish to use such a system.
Yen, Kung-Kai, and 顏工凱. "An Information Security Knowledge Management System for Information Technology Industry." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/77067390564461984336.
Full text中華大學
資訊管理學系
104
The knowledge in enterprise is often omission or lost due to the change of job position or transformation of business. As a result, enterprise not only lost a valuable asset, but also damaged the interests of enterprise. With government paid more and more attention in protecting information security in recent years, each industry derived applicable processes and specifications to itself. If enterprise did not have a suitable process, enterprise may damage business interests when event occurs and cannot be processing immediately. This research designs and implements information security knowledge management system based on information technology enterprises. The study followed ISO/IEC 27001 which is an international information security management standard, to inspect business process and further defined appropriate specification. Besides, the research collected information security incidents that occurred in enterprise. In order to let enterprise staffs actively provide knowledge of information security incidents, the research establishes incentive mechanism based on learning motivation model theory. The research implements a knowledge management system for information security and adopts questionnaires to verify feasibility. The proposed system not only stores, transfers and shares personnel experience and knowledge of information security incidents but also provides systematic understanding of how to deal with when events occur. The proposed system will bring more benefit for enterprise.