Evaluasi dan Perancangan Identity Governance Administration (IGA) dalam Manajemen Akses Karyawan Menggunakan Standar ISO 27001:2022 [PDF]
Pengelolaan karyawan dan pemberian akses karyawan pada PT XYZ masih dilakukan secara manual sehingga menyebabkan pembuatan akun tidak tepat waktu, permintaan hak akses tidak ditinjau dengan baik, dan pencabutan akses karyawan saat resign juga tidak ...
Cindana, Theresia
core
The structure of the isms documentation in accordance with updates to ISO 27001:2022, 27002:2022
Building information security in the modern world is one of the most important aspects of the stable development of any IT business. In order not to reinvent the wheel, it is most logical to use already proven solutions, namely to follow the international standards ISO 27001, ISO 27002. This paper will contain recommendations on the organization of the
openaire +1 more source
RSUD Kyai Haji Zaenal Musthafa, rumah sakit tipe C yang diresmikan pada 22 Februari 2011, menyediakan layanan kesehatan dengan dukungan sistem pendaftaran online. Namun penggunaan sistem informasi digital memunculkan risiko keamanan siber. Untuk mengevaluasi tingkat keamanan sistem informasi manajemen rumah sakit tersebut, digunakan Indeks KAMI yang ...
null Rayhan Ramadhan +2 more
openaire +1 more source
Preparing DevOps for ISO 27001 certification [PDF]
Nykyaikaisessa ohjelmistokehityksessä ja IT-alalla yleisesti tietoturvan tarve kasvaa päivä päivältä. ISO 27001 on tällä hetkellä yleisimmin käytetty tietoturvastandardi ja siihen liittyvällä sertifikaatilla on monia etuja tietoturvapoikkeamien ja ...
Laine, Marjo
core
Seguridad de información mediante ISO-NTP/IEC 27001 para el control de riesgos de seguridad de la información en la DRE-Junín 2022 [PDF]
La seguridad de información es importante para resguardar los activos de información de las organizaciones públicas como privadas mediante un sistema de gestión de la seguridad de la información.
Llantoy Palomino, Fredy Fielmer
core
From ISO 27001:2022 to NIS2 - Identifying Gaps and Overlaps
Die Europäische Union hat als Reaktion auf die zunehmenden Cyberbedrohungen eine neue Rechtsvorschrift erlassen, um den Schutz der Cybersicherheit von Organisationen im öffentlichen und privaten Sektor ihrer Mitgliedstaaten zu stärken. Die Einführung der NIS2-Richtlinie (Richtlinie (EU) 2022/2555) stellt dabei einen bedeutenden Fortschritt dar, da sie ...
openaire
Siber saldırılardaki artış ile bilgi güvenliği ve Bilgi Güvenliği Yönetim Sistemi (BGYS) büyük önem kazanmıştır. BGYS’yi kurmak, kurumların bilgi varlıklarını belirleyerek, önemine göre risklerini tanımlayıp yönetmesine ve iş sürekliliğini sağlamasına destek olmaktadır.
openaire +1 more source
A hybrid cybersecurity framework for small businesses : integrating NIST CSF, ISO 27001, and CEO engagement [PDF]
Small businesses face escalating cyber threats but often lack the resources to implement robust defenses. This thesis proposes a hybrid cybersecurity framework integrating NIST CSF, ISO 27001, and CEO proactive culture to address business vulnerabilities.
Mdaki, Jacob
core
Technical requirements and optimization strategies for home-based teleradiology workstations: a review article. [PDF]
Alhasan MS, Alhasan AS.
europepmc +1 more source
Privacy Protection in AI Transformation Environments: Focusing on Integrated Log System and AHP Scenario Prioritization. [PDF]
Lim DS, Lee SJ.
europepmc +1 more source

