Results 201 to 210 of about 266,507 (244)
Some of the next articles are maybe not open access.

Information Security Behavior and Compliance with ISO 27001 in IT Companies

Journal of Digital Business and Innovation Management
This article discusses the importance of information security behavior and the application of the ISO 27001 standard in the context of IT companies. Using PRISMA guidelines, we outline the important role of information security behavior in maintaining ...
Mohammad Rafli   +5 more
semanticscholar   +1 more source

Risk Assessment at it Company by Focusing on Information Security Area Using Iso 27001:2022

Syntax literate : jurnal ilmiah Indonesia
Modern technology companies should prioritize information security by focusing on system vulnerabilities and adopting a risk management approach based on the ISO/IEC 27001:2022 standard.
Athallariq Rafii Nugroho, Nilo Legowo
semanticscholar   +1 more source

VENDOR RISK MANAGEMENT IN CLOUD-CENTRIC ARCHITECTURES: A SYSTEMATIC REVIEW OF SOC 2, FEDRAMP, AND ISO 27001 PRACTICES

International Journal of Business and Economics Insights
This systematic review synthesizes evidence on vendor risk management (VRM) in cloud-centric architectures with explicit attention to three anchor frameworks—SOC 2, FedRAMP, and ISO/IEC 27001—and their combined effects on organizational governance and ...
Md Omar Faruq
semanticscholar   +1 more source

Examining ISO/IEC 27001 Standard

2021
The demand for risk analysis and information security of systems by institutions that run an information system is rapidly increasing. The utilization of modern information technology in businesses mandates the introduction of different measures to protect the information and systems that house this information.
openaire   +1 more source

Is ISO 27001 worth it?

Computer Fraud & Security, 2011
The ISO 27001 information security management system standard is well respected and internationally recognised. But although it has been around in various guises for more than a decade, accreditation levels remains low because of its reputation for taking a lot of time, effort and money.
openaire   +1 more source

Das ISMS nach ISO 27001

2011
In diesem Kapitel werden wir das Modell und die Elemente eines ISMS nach ISO 27001 behandeln. Die weitere Gliederung orientiert sich deshalb hart an den Kapiteln des Standards34 Sicher gibt es auch andere Moglichkeiten, ein ISMS zu beschreiben.
Heinrich Kersten   +2 more
openaire   +1 more source

Sistem Manajemen Keamanan Informasi (SMKI) di PT. Surveyor Indonesia Cabang Surabaya: Penerapan Standar ISO 27001:2013

ULIL ALBAB : Jurnal Ilmiah Multidisiplin
This article discusses the implementation of the Information Security Management System (ISMS) and the adoption of the ISO 27001:2013 standard at PT Surveyor Indonesia Surabaya Branch.
R. Teddy, Adi Prawiranata
semanticscholar   +1 more source

Iso 27001

2022
Rajkumar Banoth   +2 more
openaire   +1 more source

ISO 27001 u praksi [PDF]

open access: possible, 2011
U ovom radu opisan je proces implementacije ISO 27001 norme u tvrtki Etna d.o.o. Kroz rad opisani su sigurnosni zahtjevi koje tvrtka treba zadovoljiti, opis ISO 27001 norme, ključne točke za uvođenje norme te upravljanje rizicima u informacijskom sustavu tvrtke.
openaire  

Der Standard ISO/IEC 27001:2013

Datenschutz und Datensicherheit - DuD, 2014
Nach acht Jahren wurde 2013 der ISMS-Standard ISO/IEC 27001 uberarbeitet. In diese uberarbeitung sind viele Erfahrungen aus der Praxis eingeflossen, die ein Arbeiten nach dem neuen Standard vereinfachen sollen. In diesem Beitrag werden die wesentlichen Anderungen im Standard und im Anhang A vorgestellt. Um es vorweg zu nehmen: Die Anderungen sind weder
openaire   +1 more source

Home - About - Disclaimer - Privacy