Zobrazeno 1 - 10
of 89
pro vyhledávání: '"information security management system (isms)"'
Autor:
Raković Radoslav M.
Publikováno v:
Tehnika, Vol 79, Iss 3, Pp 361-367 (2024)
With the development of information technologies and their application in all spheres of activity, information security has become an actual problem. A significant step towards solving that problem was the adoption of the ISO/IEC 27000 family of stan
Externí odkaz:
https://doaj.org/article/8ca4daa474454afcb1098328c7f17db2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Santi Pattanavichai
Publikováno v:
International Journal of Electronics and Telecommunications, Vol vol. 68, Iss No 3, Pp 475-481 (2022)
Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is importan
Externí odkaz:
https://doaj.org/article/74b1f3b4c716474bb49bd554b61fdac3
Publikováno v:
Journal of King Saud University: Computer and Information Sciences, Vol 34, Iss 6, Pp 3079-3095 (2022)
The lack of national security standardization bodies can have adverse impact on the adoption of international security standards and best practices. To assure security confidence among various organizations and to promote systematic adoption of stand
Externí odkaz:
https://doaj.org/article/dd84a2ea889b4ff688f73d9b9b0c71d3
Autor:
Valentin BRICEAG
Publikováno v:
Revista Română de Informatică și Automatică, Vol 32, Iss 1, Pp 99-112 (2022)
The paper examines a Multiple Profile Model of Information Security Maturity (ISM3), uncomplicated and clear, aimed at generating particular (Individual) Information Security Profiles (PISI). ISM3 is based on currently known best practices for inform
Externí odkaz:
https://doaj.org/article/64177e9bb4cb445b8963dbd6850d9359
Publikováno v:
Tehnički Vjesnik, Vol 29, Iss 6, Pp 2090-2097 (2022)
Organizations are required to implement an information security management system (ISMS) for making a central cybersecurity framework, reducing costs, treating risks, and so on. Several ISMS standards have been issued and implemented locally and inte
Externí odkaz:
https://doaj.org/article/7ae125ef80504837bfa2cd5a756108cc
Publikováno v:
TEM Journal. 8(3):1017-1024
Externí odkaz:
https://www.ceeol.com/search/article-detail?id=791128
Publikováno v:
مطالعات مدیریت کسب و کار هوشمند, Vol 8, Iss 30, Pp 33-54 (2019)
Competitive business environment and high dependency to the services has caused organizations to be evaluated based on the level of their ability in providing continuous services. Information Technology (IT) service continuity management discusses th
Externí odkaz:
https://doaj.org/article/0896231cf7b443d69446215b9acf3dba
Publikováno v:
Information & Computer Security, 2017, Vol. 25, Issue 3, pp. 240-258.
Externí odkaz:
http://www.emeraldinsight.com/doi/10.1108/ICS-07-2016-0053
Autor:
Persson, Oscar, Notelid, Nils
Information security is an important focus area in our business climate, where cyberattacks pose a growing threat. To address the increasing threat landscape, it is crucial for companies to establish guidelines and regulations on how employees and co
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-61522