• Corpus ID: 167991887

Information Security Management Best Practice Based on ISO/IEC 17799 The international information security standard provides a framework for ensuring business continuity, maintaining legal compliance, and achieving a competitive edge

@inproceedings{SaintGermain2005InformationSM,
  title={Information Security Management Best Practice Based on ISO/IEC 17799 The international information security standard provides a framework for ensuring business continuity, maintaining legal compliance, and achieving a competitive edge},
  author={Ren{\'e} Saint-Germain},
  year={2005}
}
Introduces various best practices for implementing security controls Lists the 10 security domains of ISO/IEC 17799 Describes the benefits of implementing ISO/IEC 17799 Talks about security trends ecurity matters have become an integral part of daily life, and organizations need to ensure that they are adequately secured. While legislatures enact corporate governance laws, more and more businesses are seeking assurance that their vendors and partners are properly protecting information assets… 
2 Citations

Implementation of the OCTAVE Methodology in Security Risk Management Process for Business Resources

One of the most important factors of real live teleinformatic systems are risk management process. The question that arises is how to implement this process in real and big organizations. Every day,

An Initial Investigation of Protocol Customization

TLDR
This work identifies key research challenges for the support of systematic and sufficiently automated protocol customization through real-world case study on popular protocol software, and proposes an access control framework as a principled solution to unify existing protocol customization practices.

References

SHOWING 1-10 OF 11 REFERENCES

Introduction to the OCTAVE ® Approach

TLDR
By using the OCTAVE approach, an organization makes information-protection decisions based on risks to the confidentiality, integrity, and availability of critical information-related assets, enabling an organization to match a practice-based protection strategy to its security risks.

Information Technology: Code of Practice for Information Security Management

Swedish Standards corresponding to documents referred to in this Standard are listed in ”Catalogue of Swedish Standards”, issued by SIS. The Catalogue lists, with reference number and year of Swedish

Introduction to the OCTAVE Approach CERT Coordination Center

  • Introduction to the OCTAVE Approach CERT Coordination Center
  • 2005

Information and Communication Technology: Frequently Asked Questions Available at www.bsi-global.com/ICT/Security/faqs

  • Information and Communication Technology: Frequently Asked Questions Available at www.bsi-global.com/ICT/Security/faqs
  • 2005

International Standard ISO/IEC 17799:2000 Code of Practice for Information Security Management – Frequently Asked Questions

  • International Standard ISO/IEC 17799:2000 Code of Practice for Information Security Management – Frequently Asked Questions
  • 2002

COBIT Mapping: Mapping ISO/IEC 17799: 2000 With COBIT Available at www.isaca.org/Template.cfm?Section= Research2&Template=/ContentManagement/ContentDisplay

  • Information Systems Audit and Control Association
  • 2005

Unraveling Security and Risk Regulation

  • Unraveling Security and Risk Regulation
  • 2005

Giga Information Group, Inc IT Trends 2003: Information Security Standards, Regulations and Legislation

  • Giga Information Group, Inc IT Trends 2003: Information Security Standards, Regulations and Legislation
  • 2005

CIO Primer for Three Standard Deviations

  • CIO Primer for Three Standard Deviations
  • 2005