Abstract | ||
---|---|---|
This article briefly describes the introduction and evolution of Information Security Management Systems (ISMS), their application and the introduction of national and regulatory requirements to protect information and how these regulations may be mapped into an ISMS. |
Year | DOI | Venue |
---|---|---|
2006 | 10.1016/j.istr.2005.12.001 | Inf. Sec. Techn. Report |
Keywords | Field | DocType |
regulatory requirement,security regulation,article briefly,security standard,cobit,security management framework,isms,security compliance,information security management systems,sox,iso-27001:2005,security management,information security management | ITIL security management,Internet privacy,Computer security,Information security standards,Computer science,Certified Information Security Manager,Information security,Security service,Information security management,Security information and event management,Information security management system | Journal |
Volume | Issue | ISSN |
11 | 1 | Information Security Technical Report |
Citations | PageRank | References |
15 | 0.92 | 0 |
Authors | ||
1 |
Name | Order | Citations | PageRank |
---|---|---|---|
J. Stuart Broderick | 1 | 16 | 1.35 |