Computer Science – Cryptography and Security
Scientific paper
2012-04-06
Computer Science
Cryptography and Security
Susanto et al, 2010
Scientific paper
It is imperative for organizations to us Information Security Management System (ISMS) to effectively manage their information assets. ISMS starts with a set of policies that dictate the usage computer resources. It starts with the "21 essential security controls" of ISO 27001, which give the basic standard requirements of information security management. Our research is concerned with the assessment of the application of these controls to organizations. STOPE (Strategy, Technology Organization, People and Environment) methodologies were used to integrated domains as a framework for this assessment. The controls are mapped on these domains and subsequently refined into "246 simple and easily comprehended elements".
Almunawar Mohammad Nabil
Muhaya Fahad Bin
Susanto Heru
Tuan Yong Chee
No associations
LandOfFree
Refinement of Strategy and Technology Domains STOPE View on ISO 27001 does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Refinement of Strategy and Technology Domains STOPE View on ISO 27001, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Refinement of Strategy and Technology Domains STOPE View on ISO 27001 will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-183012