Letteratura scientifica selezionata sul tema "Information security standards"

Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili

Scegli il tipo di fonte:

Consulta la lista di attuali articoli, libri, tesi, atti di convegni e altre fonti scientifiche attinenti al tema "Information security standards".

Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.

Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.

Articoli di riviste sul tema "Information security standards"

1

Pepper, Bill. "Information security standards for outsourcing". Information Security Technical Report 1, n. 3 (gennaio 1996): 59–61. http://dx.doi.org/10.1016/s1363-4127(97)83021-x.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Humphreys, Edward. "Information security management system standards". Datenschutz und Datensicherheit - DuD 35, n. 1 (gennaio 2011): 7–11. http://dx.doi.org/10.1007/s11623-011-0004-3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Höne, Karin, e J. H. P. Eloff. "Information security policy — what do international information security standards say?" Computers & Security 21, n. 5 (ottobre 2002): 402–9. http://dx.doi.org/10.1016/s0167-4048(02)00504-7.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Gaivéo, José. "Information Security Standards in Healthcare Activities". International Journal of Reliable and Quality E-Healthcare 5, n. 4 (ottobre 2016): 15–33. http://dx.doi.org/10.4018/ijrqeh.2016100102.

Testo completo
Abstract (sommario):
Information is mandatory in healthcare activities and in all that are related to it. In this same sense, people that deal with those information requires attention because patient´s information could be exposed. The use of directions stated by information security standards might allow a proactive attitude in the face of the diversity of threats that as the potential to explore the vulnerabilities of organizational assets. This article intends to recognize information threats and vulnerabilities that could be explored, using information security international standards to support the activities needed to assume information safeguard. Another intention is the establishment of a basis of references in information security to define a level of risk classification to build a referential to the potential that a given threat has to exploit the vulnerabilities of informational assets, preventing damages to personal and organizational property, and also activity continuity, assuming information as the main resource.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Dykyi, O., e M. Fliunt. "Information security standards: a comparative research". Law and public administration 2, n. 1 (2019): 88–95. http://dx.doi.org/10.32840/pdu.2-1.14.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Lee, Chul Ho, Xianjun Geng e Srinivasan Raghunathan. "Mandatory Standards and Organizational Information Security". Information Systems Research 27, n. 1 (marzo 2016): 70–86. http://dx.doi.org/10.1287/isre.2015.0607.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Poore, Ralph Spencer. "Information Security Standards: Deluge and Dearth". Information Systems Security 10, n. 1 (marzo 2001): 1–6. http://dx.doi.org/10.1201/1086/43313.10.1.20010304/31392.4.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Gentile, Francesco, Luigi Giuri, Franco Guida, Emilio Montolivo e Michele Volpe. "Security evaluation in information technology standards". Computers & Security 13, n. 8 (gennaio 1994): 647–50. http://dx.doi.org/10.1016/0167-4048(94)90044-2.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Chenoweth, John D. "Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management". Journal of Information Privacy and Security 1, n. 1 (gennaio 2005): 43–44. http://dx.doi.org/10.1080/15536548.2005.10855762.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

von Solms, Rossouw. "Information security management: why standards are important". Information Management & Computer Security 7, n. 1 (marzo 1999): 50–58. http://dx.doi.org/10.1108/09685229910255223.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Tesi sul tema "Information security standards"

1

Thomson, Steven Michael. "A standards-based security model for health information systems". Thesis, Nelson Mandela Metropolitan University, 2008. http://hdl.handle.net/10948/718.

Testo completo
Abstract (sommario):
In the healthcare environment, various types of patient information are stored in electronic format. This prevents the re-entering of information that was captured previously. In the past this information was stored on paper and kept in large filing cabinets. However, with the technology advancements that have occurred over the years, the idea of storing patient information in electronic systems arose. This led to a number of electronic health information systems being created, which in turn led to an increase in possible security risks. Any organization that stores information of a sensitive nature must apply information security principles in order to ensure that the stored information is kept secure. At a basic level, this entails ensuring the confidentiality, integrity and availability of the information, which is not an easy feat in today’s distributed and networked environments. This paved the way for organized standardization activities in the areas of information security and information security management. Throughout history, there have been practices that were created to help “standardize” industries of all areas, to the extent that there are professional organizations whose main objective it is to create such standards to help connect industries all over the world. This applies equally to the healthcare environment, where standardization took off in the late eighties. Healthcare organizations must follow standardized security measures to ensure that patient information stored in health information systems is kept secure. However, the proliferation in standards makes it difficult to understand, adopt and deploy these standards in a coherent manner. This research, therefore, proposes a standards-based security model for health information systems to ensure that such standards are applied in a manner that contributes to securing the healthcare environment as a whole, rather than in a piecemeal fashion.
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Johan, Boström. "Compliance & Standards - The Journey To Security". Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-446601.

Testo completo
Abstract (sommario):
We are in the age of Information Technology (IT) and amazinginnovations are developed. Management systems are now completelydigitalized and it has enabled people to continue working remotely inthe midst of a pandemic. With great innovations there are those thatseek to misuse or destroy systems for personal gain. Therefore IT &Information security is paramount both for organisation and products.To offer both an international approach for common security practicesand provide best results for IT & Information security there existsstandards and frameworks. In this thesis, the standard frameworksgeneral impact and value from both an organisational and a vendorsperspective is evaluated and assessed. To answer the research questionsof this thesis, standards and supporting theory were analysed andinterviewees with security professionals were held. Standards provideorganisational goals for developing a well-functioning and resilientsecurity. Standards also provide a common baseline between customerand vendors, minimising the need for tailoring in products’ securityrequirements. Furthermore, a certification for standards can increasethe confidence of the organisation or product, and generate a businessvalue. Whilst there are many benefits, the standards offer a structure onhow security can be built, but an organisation needs to understand anddevelop a security adapted to their organisation. In addition to setting upa security framework and implementing controls, organisation need tocreate security assurance processes to continuously review and evaluatemeasures to ascertain security posture.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Shoraka, Babak. "An Empirical Investigation of the Economic Value of Information Security Management System Standards". NSUWorks, 2011. http://nsuworks.nova.edu/gscis_etd/304.

Testo completo
Abstract (sommario):
Within the modern and globally connected business landscape, the information assets of organizations are constantly under attack. As a consequence, protection of these assets is a major challenge. The complexities and vulnerabilities of information systems (ISs) and the increasing risks of failure combined with a growing number of security incidents, prompts these entities to seek guidance from information security management standards. The International Organization of Standardization (ISO) Information Security Management System (ISMS) standard specifies the requirements for establishing, operating, monitoring, and improving an information security management system within the context of an organization's overall business risks. Importantly, this standard is designed to ensure the selection of adequate information security controls for the protection of an organization's information assets and is the only auditable international standard for information security management. The adoption of, and certification against the ISO ISMS standard is a complex process which impacts many different security aspects of organizations and requires significant investments in information security. Although many benefits are associated with the adoption of an information security management standard, organizations are increasingly employing economic measures to evaluate and justify their information security investments. With the growing emphasis on the importance of understanding the economic aspects of information security, this study investigated the economic value of the ISO ISMS standard adoption and certification. The principles of the efficient market hypothesis and the event study methodology were employed to establish whether organizations realized economic gains from obtaining certification against the ISO ISMS standard. The results of this research showed that capital markets did not react to the ISO ISMS certification announcements. Furthermore, the capital market reaction to information security breaches was not different between ISO ISMS certified and non-certified firms. It was concluded that the ISO ISMS certification did not create economic value for the certified firms
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Ngqondi, Tembisa Grace. "The ISO/IEC 27002 and ISO/IEC 27799 information security management standards : a comparative analysis from a healthcare perspective". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1066.

Testo completo
Abstract (sommario):
Technological shift has become significant and an area of concern in the health sector with regard to securing health information assets. Health information systems hosting personal health information expose these information assets to ever-evolving threats. This information includes aspects of an extremely sensitive nature, for example, a particular patient may have a history of drug abuse, which would be reflected in the patient’s medical record. The private nature of patient information places a higher demand on the need to ensure privacy. Ensuring that the security and privacy of health information remain intact is therefore vital in the healthcare environment. In order to protect information appropriately and effectively, good information security management practices should be followed. To this end, the International Organization for Standardization (ISO) published a code of practice for information security management, namely the ISO 27002 (2005). This standard is widely used in industry but is a generic standard aimed at all industries. Therefore it does not consider the unique security needs of a particular environment. Because of the unique nature of personal health information and its security and privacy requirements, the need to introduce a healthcare sector-specific standard for information security management was identified. The ISO 27799 was therefore published as an industry-specific variant of the ISO 27002 which is geared towards addressing security requirements in health informatics. It serves as an implementation guide for the ISO 27002 when implemented in the health sector. The publication of the ISO 27799 is considered as a positive development in the quest to improve health information security. However, the question arises whether the ISO 27799 addresses the security needs of the healthcare domain sufficiently. The extensive use of the ISO 27002 implies that many proponents of this standard (in healthcare), now have to ensure that they meet the (assumed) increased requirements of the ISO 27799. The purpose of this research is therefore to conduct a comprehensive comparison of the ISO 27002 and ISO 27799 standards to determine whether the ISO 27799 serves the specific needs of the health sector from an information security management point of view.
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Domingues, Steve. "Navigating between information security management documents : a modeling methodology". Thesis, Nelson Mandela Metropolitan University, 2010. http://hdl.handle.net/10948/1212.

Testo completo
Abstract (sommario):
Organizations no longer draft their own standards. Instead, organizations take advantage of the available international standards. One standard may not cover all the organization's needs, requiring organizations to implement more than one standard. The same aspect in an organization may be covered by two or more standards, creating an overlap. An awareness of such overlaps led to various institutions creating mapping documents illustrating how a control from one standard relates to a control from a different standard. The mapping documents are consulted by the end user, to identify how a control in one standard may relate to other standards. This allows the end user to navigate between the standards documents. These mapping documents are valuable to a person who wishes to grasp how different standards deal with a specific control. However, the navigation between standards is a cumbersome task. In order to navigate between the standards the end user is required to consult three or more documents, depending on the number of standards that are mapped to the control being investigated. The need for a tool that will provide fast and efficient navigation between standards was identified. The data tier of the tool is the focus of this dissertation. As a result, this research proposes a modeling methodology that will allow for the modeling of the standards and the information about the mapping between standards, thereby contributing to the creation of tools to aid in the navigation between standards. A comparison between the major data modeling paradigms identifies multi-dimensional modeling as the most appropriate technique to model standards. Adapting an existing modeling methodology to cater for the modeling standards, yield a five step standard modeling methodology. Once modeled, the standards can be physically implemented as a database. The database schema that results from the standard modeling methodology adheres to a specific pattern and can thus be expressed according to well-defined meta-model. This allows for the generation of SQL statements by a tool with limited knowledge of the standards in a way that allows the quick navigation between standards. To determine the usefulness of the standards modeling methodology the research presents iv a prototype that utilizes the well-defined meta-model to navigate between standards. It is shown that, as far as navigation is concerned, no code changes are necessary when adding a new standard or new mappings between standards. This research contributes to the creation of a tool that can easily navigate between standards by providing the ability to model the data tier in such a way that it is extensible, yet remains independent of the application and presentation tiers.
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Dresner, Daniel Gideon. "A study of standards and the mitigation of risk in information systems". Thesis, University of Manchester, 2011. https://www.research.manchester.ac.uk/portal/en/theses/a-study-of-standards-and-the-mitigation-of-risk-in-information-systems(d316550b-f305-4802-a037-688bb44bdc48).html.

Testo completo
Abstract (sommario):
Organisations from the multinational Organisation for Economic Cooperation and Development through to national initiatives such as the UK's Cabinet Office, have recognised that risk - the realisation of undesirable outcomes - needs a firm framework of policy and action for mitigation. Many standards have been set that implicitly or explicitly expect to manage risk in information systems, so creating a framework of such standards would steer outcomes to desirable results.This study applies a mixed methodology of desk enquiries, surveys, and action research to investigate how the command and control of information systems may be regulated by the fusion and fission of tacit knowledge in standards comprising the experience and inductive reasoning of experts. Information system user organisations from the membership of The National Computing Centre provided the working environment in which the research was conducted in real time. The research shows how a taxonomy of risks can be selected, and how a validated catalogue of standards which describe the mitigation of those risks can be assembled taking the quality of fit and expertise required to apply the standards into account. The work bridges a gap in the field by deriving a measure of organisational risk appetite with respect to information systems and the risk attitude of individuals, and linking them to a course of action - through the application of standards - to regulate the performance of information systems within a defined tolerance. The construct of a methodology to learn about a framework of ideas has become an integral part of the methodology itself with the standards forming the framework and providing direction of its application.The projects that comprise the research components have not proven the causal link between standards and the removal of risk, leaving this ripe for a narrowly scoped, future investigation. The thesis discusses the awareness of risk and the propensity for its management, developing this into the definition of a framework of standards to mitigate known risks in information systems with a new classification scheme that cross-references the efficacy of a standard with the expertise expected from those who apply it. The thesis extends this to the idea that the framework can be scaled to the views of stakeholders, used to detect human vulnerabilities in information systems, and developed to absorb the lessons learnt from emergent risk. The research has clarified the investigation of the security culture in the thrall of an information system and brought the application of technical and management standards closer to overcoming the social and psychological barriers that practitioners and researchers must overcome.
Gli stili APA, Harvard, Vancouver, ISO e altri
7

ALEXANDRIA, JOAO C. S. de. "Gestao da seguranca da informacao - uma proposta para potencializar a efetividade da seguranca da informacao em ambiente de pesquisa cientifica". reponame:Repositório Institucional do IPEN, 2009. http://repositorio.ipen.br:8080/xmlui/handle/123456789/9474.

Testo completo
Abstract (sommario):
Made available in DSpace on 2014-10-09T12:27:08Z (GMT). No. of bitstreams: 0
Made available in DSpace on 2014-10-09T13:56:07Z (GMT). No. of bitstreams: 0
Tese (Doutoramento)
IPEN/T
Instituto de Pesquisas Energeticas e Nucleares - IPEN-CNEN/SP
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Owen, Morné. "An enterprise information security model for a micro finance company: a case study". Thesis, Nelson Mandela Metropolitan University, 2009. http://hdl.handle.net/10948/1151.

Testo completo
Abstract (sommario):
The world has entered the information age. How the information is used within an organization will determine success or failure of the organisation. This study aims to provide a model, that once implemented, will provide the required protection for the information assets. The model is based on ISO 27002, an international security standard. The primary objective is to build a model that will provide a holistic security system specifically for a South African Micro Finance Company (MFC). The secondary objectives focuses on successful implementation of such a model, the uniqueness of the MFC that should be taken into account, and the maintenance of the model once implemented to ensure ongoing relevance. A questionnaire conducted at the MFC provided insight into the perceived understanding of information security. The questionnaire results were used to ensure the model solution addressed current information security shortcomings within the MFC. This study found that the information security controls in ISO 27002 should be applicable to any industry. The uniqueness for the MFC is not in the security controls, but rather in the regulations and laws applicable to it.
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Hedian, Daniel, e Neto Gil Silva. "The Risk Assessment based on international standards, a credibility evaluation: A case study on international standards of Risk Assessment and Management in the Information Security context". Thesis, Umeå universitet, Företagsekonomi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-99982.

Testo completo
Abstract (sommario):
Summary Organizations face risks regardless of the type of industry or government. Historically risks have been undertaken in various processes and coped with differently by society. An appropriate application of risk management is widely acknowledged as one of the most critical aspects of undertaking business activities across all sectors in society, public and private. In order to carry out this activity as part of the crucial actions the organizations implement as part of their culture, many standards have been developed at the international level. These standards provide the groundwork for entities to start implementing these processes and reduce the risk they face with a standardized set of procedures across sectors. Risk assessment faces abundant arguments that lead to doubt the credibility of the standards implemented by different organizations, as not a single method or definition is agreed upon across cultural and sectorial barriers. Therefore, the credibility of the standardized assessment is doubted. This study aims to evaluate the credibility of standardized risk assessments with a focus on the Information Security Risk Assessment Standards, in particular ISO 27005 and NIST 800-30 in collaboration with the Swedish Armed Forces. The research adapts the frameworks available in literature to evaluate credibility of risk assessments to the international standardized assessment procedure. The standards credibility will be evaluated with different criteria divided in five categories considered applicable to the standardised risk assessment procedure. Also, input from experts in organizations currently employing the standards and academic experts in the field will also be utilized. This study utilizes a qualitative case study approach. The credibility evaluation performance of each international standard is similar; the only category that NIST 800-30 has a significant better performance is the category related to the final Risk Assessment Results (Report). The NIST provides a further step in the process as well as the guidelines and templates in order to develop different parts of the assessment process including the report, which is considered a best practice of a standardised risk assessment. The findings of the research contradict four criteria of the framework found in the literature, related to with what can be learned from past risk assessments, to the wide ranging of the required scope of a risk assessment, the relevance of the disclosure of information on the final risk assessment report related to the composition of the assessment group and finally the procedure for finding consensus among stakeholders. The research question “How credible are standardized risk assessments?” provide a holistic understanding of the credibility of the standards previously mentioned, determining that these provide a solid framework for companies to start assessing the risks in a regulated and standardized procedure. These oversee the problems embedded in the subjectivity of a risk assessment and the ever-changing (intrinsic and extrinsic) aspects of stakeholder behaviour with a lack of a systemic approach to solve these issues, which also include the lack of proper handling of risk uncertainty and the lack of transparency on the final risk assessment report. The study provides a groundwork which can be used in order to develop future research. This study also provides a grounded framework which can be used by entities utilizing the standards in order to reflect their procedures of their risk assessment activities. Keywords: Credibility, risk assessment, risk management, international standards, risk, information security, ISO 27005, NIST 800-30.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Mikkelinen, Nicklas. "Analysis of information classification best practices". Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-11551.

Testo completo
Abstract (sommario):
Information security, information management systems and more specifically information classification are important parts of an organisations information security. More and more information is being processed each day, and needs to be secured. Without proper information classification guidelines in place and lacking research within the subject, organisations could be vulnerable to attacks from third parties. This project displays a list of best practices found within information classification guidelines published online by different organisations. Out of 100 reviewed documents, 30 included information classification guidelines, and when analysed with a thematic analysis provides best practices within information classification.
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Libri sul tema "Information security standards"

1

Security: Technical security standards for information technology. Ontario, Canada: Royal Canadian Mounted Police, 1992.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Aalders, J. C. H. Handbook for information security: A guide towards information security standards. Amsterdam: North-Holland, 1985.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Landoll, Douglas J. Information Security Policies, Procedures, and Standards. Boca Raton, FL : CRC Press, 2016.: Auerbach Publications, 2017. http://dx.doi.org/10.1201/9781315372785.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Information Security Policies, Procedures, and Standards. London: Taylor and Francis, 2001.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Torp, Jeffrey. Information security: Guidance, standards, and issuances. Austin, Tex: AlexInformation, 2006.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Information security policies, procedures, and standards: Guidelines for effective information security management. Boca Raton, FL: Auerbach, 2002.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Kou, Weidong. Networking Security and Standards. Boston, MA: Springer US, 1997.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Information Technology Laboratory (National Institute of Standards and Technology). Standards for security categorization of federal information and information systems. Gaithersburg, MD: Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, 2004.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Sychev, Yuriy. Information protection and information security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1013711.

Testo completo
Abstract (sommario):
The textbook is developed in accordance with current standards at a high methodological level and can be used to study the following subjects: "Fundamentals of information security", "Information security", "information Protection", "threats to information security", "Malware", "Antivirus programs", "Technology for building secure automated systems". Meets the requirements of Federal state educational standards of higher education of the latest generation. The material presented in the textbook is tested in the classroom and is intended for students studying in the direction of training 10.03.01 "Information security" (bachelor's level). It can also be used in preparation for admission to the master's program.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Standard security label for information transfer. Gaithersburg, MD: U.S. Dept. of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Systems Laboratory, 1994.

Cerca il testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Più fonti

Capitoli di libri sul tema "Information security standards"

1

Pawaskar, Samir. "Information Security Policy and Standards". In Information Security and Optimization, 1–12. First edition. | Boca Raton : C&H\CRC Press, 2021.: Chapman and Hall/CRC, 2020. http://dx.doi.org/10.1201/9781003045854-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Campbell, Tony. "Standards, Frameworks, Guidelines, and Legislation". In Practical Information Security Management, 71–93. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1685-9_6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Brooks, W. J., M. Warren e W. Hutchinson. "A Security Evaluation Criteria for Baseline Security Standards". In IFIP Advances in Information and Communication Technology, 79–89. Boston, MA: Springer US, 2002. http://dx.doi.org/10.1007/978-0-387-35586-3_6.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Shoniregun, Charles A., Kudakwashe Dube e Fredrick Mtenzi. "Laws and Standards for Secure e-Healthcare Information". In Advances in Information Security, 59–100. Boston, MA: Springer US, 2010. http://dx.doi.org/10.1007/978-0-387-84919-5_3.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

von Solms, S. H., e R. von Solms. "The Use of Best Practice Standards and Guidelines in Information Security Governance". In Information Security Governance, 1–21. Boston, MA: Springer US, 2008. http://dx.doi.org/10.1007/978-0-387-79984-1_5.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Hakim Suhaimi, Ahmad Iqbal, Takashi Manji, Yuichi Goto e Jingde Cheng. "A Systematic Management Method of ISO Information Security Standards for Information Security Engineering Environments". In Informatics Engineering and Information Science, 370–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25327-0_32.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Snare, John. "Information technology security standards — An Australian perspective". In Advances in Cryptology — AUSCRYPT '92, 365–84. Berlin, Heidelberg: Springer Berlin Heidelberg, 1993. http://dx.doi.org/10.1007/3-540-57220-1_76.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Guarino, Alessandro. "Information Security Standards in Critical Infrastructure Protection". In ISSE 2015, 263–69. Wiesbaden: Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-10934-9_22.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Bello, Gabriel, e Alfredo J. Perez. "On the Application of Financial Security Standards in Blockchain Platforms". In Advances in Information Security, 247–67. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38181-3_13.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Modeste, Ken. "Current Standards for Cyber-Hygiene in Industrial Control System Environments". In Advances in Information Security, 3–15. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-18214-4_1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Atti di convegni sul tema "Information security standards"

1

Kajava, Jorma, Juhani Anttila, Rauno Varonen, Reijo Savola e Juha Roning. "Information Security Standards and Global Business". In 2006 IEEE International Conference on Industrial Technology. IEEE, 2006. http://dx.doi.org/10.1109/icit.2006.372505.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
2

Gapinski, Andrzej J. "Cloud Computing: Information Security Standards, Compliance and Attestation". In The Thirteenth Latin American and Caribbean Conference for Engineering and Technology. LACCEI, 2015. http://dx.doi.org/10.18687/laccei2015.1.1.065.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Wang, YuFei, Bo Zhang, WeiMin Lin e Tao Zhang. "Smart grid information security - a research on standards". In 2011 IEEE International Conference on Advanced Power System Automation and Protection (APAP). IEEE, 2011. http://dx.doi.org/10.1109/apap.2011.6180558.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Armstrong, Colin J., e Helen L. Armstrong. "Mapping information security curricula to professional accreditation standards". In 2007 IEEE SMC Information Assurance and Security Workshop. IEEE, 2007. http://dx.doi.org/10.1109/iaw.2007.381910.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Ruamjinda, Poramaporn, e Nakornthip Prompoon. "Framwork for information security standards storage and retrieval using security patterns". In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615309.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

"Understanding Information Technology Security Standards Diffusion - An Institutional Perspective". In 1st International Conference on Information Systems Security and Privacy. SCITEPRESS - Science and and Technology Publications, 2015. http://dx.doi.org/10.5220/0005227200050016.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Chee, Joseph, e Ming Teo. "Improving Security in the IEEE 802.16 Standards". In 2011 Eighth International Conference on Information Technology: New Generations (ITNG). IEEE, 2011. http://dx.doi.org/10.1109/itng.2011.79.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Lontsikh, Pavel A., Viktoria A. Karaseva, Egor P. Kunakov, Ilia I. Livshitz e Ksenia A. Nikiforova. "Implementation of information security and data processing center protection standards". In 2016 IEEE Conference on Quality Management, Transport and Information Security, Information Technologies (IT&MQ&IS). IEEE, 2016. http://dx.doi.org/10.1109/itmqis.2016.7751923.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
9

Sipior, Janice, e Burke Ward. "A Framework for Information Security Management Based on Guiding Standards: A United States Perspective". In InSITE 2008: Informing Science + IT Education Conference. Informing Science Institute, 2008. http://dx.doi.org/10.28945/3188.

Testo completo
Abstract (sommario):
Despite government oversight, consumers continue to be concerned about the security of personal information used by corporations. Consumer concerns give rise to the necessity for corporations to manage information security. Navigating the multitude of existing security standards, including dedicated standards for information security and frameworks for controlling the implementation of information technology, presents a challenge to organizations. In response, we propose our ISM framework which considers global, national, organizational, and employee standards to guide ISM. We contend that a strategic approach to ISM will enable a focus on managing information as a key resource in global competition. This framework is intended to promote a cohesive approach which considers a process view of information within the context of the entire organizational operational environment. This framework can be used by international, national, and regional corporations to formulate, implement, enforce, and audit information security policies and practices.
Gli stili APA, Harvard, Vancouver, ISO e altri
10

Olifer, Dmitrij. "Evaluation metrics for ontology-based security standards mapping". In 2015 Open Conference of Electrical, Electronic and Information Sciences (eStream). IEEE, 2015. http://dx.doi.org/10.1109/estream.2015.7119494.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri

Rapporti di organizzazioni sul tema "Information security standards"

1

Mouha, Nicky. Review of the Advanced Encryption Standard. National Institute of Standards and Technology, luglio 2021. http://dx.doi.org/10.6028/nist.ir.8319.

Testo completo
Abstract (sommario):
The field of cryptography continues to advance at a very rapid pace, leading to new insights that may impact the security properties of cryptographic algorithms. The Crypto Publication Review Board ("the Board") has been established to identify publications to be reviewed. This report subjects the first standard to the review process: Federal Information Processing Standard (FIPS) 197, which defines the Advanced Encryption Standard (AES).
Gli stili APA, Harvard, Vancouver, ISO e altri
2

García-Espinosa, J., e C. Soriano. Data management plan. Scipedia, 2021. http://dx.doi.org/10.23967/prodphd.2021.9.003.

Testo completo
Abstract (sommario):
This document presents the deliverable D8.1 – the Data Management Plan (DMP) of work package 8 of the prodPhD project. It aims to present the plan for the management, generation, collection, security, preservation and sharing of data generated through the prodPhD project. The DMP is a key element for organizing the project’s data. It provides an analysis of the data, which will be collected, processed and published by the prodPhD consortium. The project embraces the initiatives of the European Commission to promote the open access to research data, aiming to improve and maximize access to and reuse of research data generated by Horizon 2020 projects. In this sense prodPhD will adhere to the Open Research Data Pilot (ORD Pilot) fostered by the European Commission, and this DMP will be developed following the standards of data storage, access and management. This plan will detail what data will be generated through the project, whether and how it will be made accessible for the verification and reuse and how it will be curated and preserved. In this context, the term data applies to the information generated during the different experimental campaigns carried out in the project, and specifically to the data, including associated metadata, to be used to validate the computational models and the technical solutions to be developed in the project. This document is the first version of the DMP and may be updated throughout the project, if significant changes (new data, changes in consortium policies, changes in consortium composition, etc.) arise.
Gli stili APA, Harvard, Vancouver, ISO e altri
3

Kramer, Robert. LED Street Lighting Implementation Research, Support, and Testing. Purdue University, 2020. http://dx.doi.org/10.5703/1288284317274.

Testo completo
Abstract (sommario):
This report describes the results of technical analysis, field tests, and laboratory tests that were performed for LED highway lighting options by the Energy Efficiency and Reliability Center (EERC) at Purdue University Northwest for the Indiana Department of Transportation (INDOT). This effort was conducted over the past 3 years to evaluate and test the technology and viability of using modern highway lighting technology to enhance energy efficiency, safety, security, and economic development of communities and roadways. During the testing period there was a continuous discussion between INDOT and EERC regarding the laboratory and field testing of INDOT approved luminaires submitted by vendors. There were multiple discussions with INDOT and vendors regarding the individual details and issues for the 29 luminaires that were tested. A comparison study was conducted by EERC of the various alternatives and comparison to currently installed luminaires. Data was collected for field tests of the luminaires by EERC and INDOT personnel for the luminaires. Field data was evaluated and compared to lighting models using vendor supplied ies data files. Multiple presentations were made at 3 separate Purdue Road Schools regarding the results and procedures of the testing program by EERC in conjunction with INDOT. A total of 22 final reports, considered confidential by INDOT, for individual vendor luminaires have been prepared as part of this effort. These reports were submitted sequentially to INDOT as testing was completed during the course of this effort. A total of 29 luminaires were tested. Some luminaire testing was terminated during testing due to design issues or vendor requests. All testing was summarized in the INDOT specification sheet attached to each report. Observations regarding the consistency of the supplied test luminaire with the requirements of Section 7.2 of the INDOT test procedure “Procedure for evaluation and approval list requirements for solid state ballasted luminaires ITM 957-17P” is provided in the Appendix to the report for each luminaire. Details regarding how these tests were performed and the respective associated evaluation of performance and reliability are provided in the report. This effort included: consideration of published and vendor information; appraisal of products consistent with national industry standards; review of physical design, thermal performance; laboratory testing of photopic performance, reliability, life cycle data and characteristics, and power characteristics; technical and probabilistic risk studies; and field testing and analysis of LED light sources including comparison to currently installed conventional light sources. Assistance in preparing INDOT standards for highway lighting was provided on multiple occasions.
Gli stili APA, Harvard, Vancouver, ISO e altri
4

Federal Information Processing Standards Publication: standard security label for information transfer. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.188.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
5

Standards for security categorization of federal information and information systems. Gaithersburg, MD: National Institute of Standards and Technology, febbraio 2004. http://dx.doi.org/10.6028/nist.fips.199.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
6

Federal Information Processing Standards Publication: security requirements for cryptographic modules. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.140-1.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
7

Federal Information Processing Standards Publication: guideline for the analysis of local area network security. Gaithersburg, MD: National Institute of Standards and Technology, 1994. http://dx.doi.org/10.6028/nist.fips.191.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
8

Federal Information Processing Standards Publication: interoperability and security requirements for use of the data encryption standard with CCITT group 3 facsimile equipment. Gaithersburg, MD: National Bureau of Standards, 1985. http://dx.doi.org/10.6028/nbs.fips.141.

Testo completo
Gli stili APA, Harvard, Vancouver, ISO e altri
Offriamo sconti su tutti i piani premium per gli autori le cui opere sono incluse in raccolte letterarie tematiche. Contattaci per ottenere un codice promozionale unico!

Vai alla bibliografia