Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas

@inproceedings{Sanchez2008PracticalAO,
  title={Practical Application of a Security Management Maturity Model for SMEs based on Predefined Schemas},
  author={L. E. Sanchez and Daniel Villafranca and E. Fern{\'a}ndez-Medina and M. Piattini},
  booktitle={SECRYPT},
  year={2008}
}
For enterprises to be able to use information technologies and communications with guarantees, it is necessary to have an adequate security management system and tools which allow them to manage it. In small and medium-sized enterprises, the application of security standards has an additional problem, which is the fact that they do not have enough resources to carry out an appropriate management. This security management system must have highly reduced costs for its implementation and… Expand
4 Citations
Building ISMS through the Reuse of Knowledge
  • 4
Managing the Asset Risk of SMEs
  • 8

References

SHOWING 1-10 OF 23 REFERENCES
Information security management: a new paradigm
  • 117
  • PDF
Developing an enterprise information security policy
  • 37
  • Highly Influential
A CC-based security engineering process evaluation model
  • J. Lee, J. Lee, S. Lee, B. Choi
  • Engineering, Computer Science
  • Proceedings 27th Annual International Computer Software and Applications Conference. COMPAC 2003
  • 2003
  • 34
Information Security Governance Reporting
  • 19
The medium-term effects of unavailability
  • 22
Information Security Management - A New Paradigm." Annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology
  • SAICSIT ́
  • 2003
...
1
2
3
...