Results 201 to 210 of about 266,507 (244)
Some of the next articles are maybe not open access.
Information Security Behavior and Compliance with ISO 27001 in IT Companies
Journal of Digital Business and Innovation ManagementThis article discusses the importance of information security behavior and the application of the ISO 27001 standard in the context of IT companies. Using PRISMA guidelines, we outline the important role of information security behavior in maintaining ...
Mohammad Rafli +5 more
semanticscholar +1 more source
Risk Assessment at it Company by Focusing on Information Security Area Using Iso 27001:2022
Syntax literate : jurnal ilmiah IndonesiaModern technology companies should prioritize information security by focusing on system vulnerabilities and adopting a risk management approach based on the ISO/IEC 27001:2022 standard.
Athallariq Rafii Nugroho, Nilo Legowo
semanticscholar +1 more source
International Journal of Business and Economics Insights
This systematic review synthesizes evidence on vendor risk management (VRM) in cloud-centric architectures with explicit attention to three anchor frameworks—SOC 2, FedRAMP, and ISO/IEC 27001—and their combined effects on organizational governance and ...
Md Omar Faruq
semanticscholar +1 more source
This systematic review synthesizes evidence on vendor risk management (VRM) in cloud-centric architectures with explicit attention to three anchor frameworks—SOC 2, FedRAMP, and ISO/IEC 27001—and their combined effects on organizational governance and ...
Md Omar Faruq
semanticscholar +1 more source
Examining ISO/IEC 27001 Standard
2021The demand for risk analysis and information security of systems by institutions that run an information system is rapidly increasing. The utilization of modern information technology in businesses mandates the introduction of different measures to protect the information and systems that house this information.
openaire +1 more source
Computer Fraud & Security, 2011
The ISO 27001 information security management system standard is well respected and internationally recognised. But although it has been around in various guises for more than a decade, accreditation levels remains low because of its reputation for taking a lot of time, effort and money.
openaire +1 more source
The ISO 27001 information security management system standard is well respected and internationally recognised. But although it has been around in various guises for more than a decade, accreditation levels remains low because of its reputation for taking a lot of time, effort and money.
openaire +1 more source
2011
In diesem Kapitel werden wir das Modell und die Elemente eines ISMS nach ISO 27001 behandeln. Die weitere Gliederung orientiert sich deshalb hart an den Kapiteln des Standards34 Sicher gibt es auch andere Moglichkeiten, ein ISMS zu beschreiben.
Heinrich Kersten +2 more
openaire +1 more source
In diesem Kapitel werden wir das Modell und die Elemente eines ISMS nach ISO 27001 behandeln. Die weitere Gliederung orientiert sich deshalb hart an den Kapiteln des Standards34 Sicher gibt es auch andere Moglichkeiten, ein ISMS zu beschreiben.
Heinrich Kersten +2 more
openaire +1 more source
ULIL ALBAB : Jurnal Ilmiah Multidisiplin
This article discusses the implementation of the Information Security Management System (ISMS) and the adoption of the ISO 27001:2013 standard at PT Surveyor Indonesia Surabaya Branch.
R. Teddy, Adi Prawiranata
semanticscholar +1 more source
This article discusses the implementation of the Information Security Management System (ISMS) and the adoption of the ISO 27001:2013 standard at PT Surveyor Indonesia Surabaya Branch.
R. Teddy, Adi Prawiranata
semanticscholar +1 more source
U ovom radu opisan je proces implementacije ISO 27001 norme u tvrtki Etna d.o.o. Kroz rad opisani su sigurnosni zahtjevi koje tvrtka treba zadovoljiti, opis ISO 27001 norme, ključne točke za uvođenje norme te upravljanje rizicima u informacijskom sustavu tvrtke.
openaire
Der Standard ISO/IEC 27001:2013
Datenschutz und Datensicherheit - DuD, 2014Nach acht Jahren wurde 2013 der ISMS-Standard ISO/IEC 27001 uberarbeitet. In diese uberarbeitung sind viele Erfahrungen aus der Praxis eingeflossen, die ein Arbeiten nach dem neuen Standard vereinfachen sollen. In diesem Beitrag werden die wesentlichen Anderungen im Standard und im Anhang A vorgestellt. Um es vorweg zu nehmen: Die Anderungen sind weder
openaire +1 more source

