TY - GEN
T1 - A study on comparative analysis of the information security management systems
AU - Jo, Heasuk
AU - Kim, Seungjoo
AU - Won, Dongho
N1 - Funding Information:
This research was supported by the Ministry of Knowledge Economy, Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2009-(C1090-0902-0016)).
PY - 2010
Y1 - 2010
N2 - Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.
AB - Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.
KW - Information Security Check
KW - Information Security Evaluation
KW - Information Security Evaluation Process
KW - Information Security Management System(ISMS)
UR - http://www.scopus.com/inward/record.url?scp=77952314021&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-12189-0_44
DO - 10.1007/978-3-642-12189-0_44
M3 - Conference contribution
AN - SCOPUS:77952314021
SN - 3642121888
SN - 9783642121883
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 510
EP - 519
BT - Computational Science and Its Applications - ICCSA 2010 - International Conference, Proceedings
PB - Springer Verlag
T2 - 2010 International Conference on Computational Science and Its Applications, ICCSA 2010
Y2 - 23 March 2010 through 26 March 2010
ER -