Research on Security Management Plan for Enterprise Information Systems

Article Preview

Abstract:

With the development of computer and network science, enterprises have built lots of information systems for enterprise management, the security management of the information systems if becoming more and more important for most of the enterprises.In this study of information security management plan,enterprises can implement a set of controls based on the controls checklists obtained from risk assesment to achieve information security.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2560-2563

Citation:

Online since:

August 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Zhu Xuan. Research and implementation of iso27001-based information security management system. Master degree thesis of Shanghai Jiao Tong University, (2009).

Google Scholar

[2] Cheng Jian-hua, Jing Ji-peng. Study on Method for Information Security Risk Evaluation . Computer Security, no. 3, pp.26-29, (2008).

Google Scholar

[3] Fenz, S, Ekelhart, A. Verification, Validation, and Evaluation in Information Security Risk Management, Security & Privacy, IEEE , vol. 9, no. 2, pp.58-65, (2011).

DOI: 10.1109/msp.2010.117

Google Scholar

[4] ISO/IEC 27002: 2005. Information technology - Security techniques - Code of practice for information security management. http: /www. iso. org/iso/home/store/catalogue_ics/ catalogue _detail _ics. htm?csnumber=50297.

DOI: 10.3403/30404989

Google Scholar

[5] COBIT 5: A Business Framework for the Governance and Management of Enterprise IT. http: /www. isaca. org/ COBIT/ Pages/default. aspx.

Google Scholar