...
首页> 外文期刊>International Journal of Information Technology >A checklist based evaluation framework to measure risk of information security management systems
【24h】

A checklist based evaluation framework to measure risk of information security management systems

机译:基于清单的评估框架,用于衡量信息安全管理系统的风险

获取原文
获取原文并翻译 | 示例
           

摘要

Today, information is rapidly increasing. For most of this information, data security and protection from unauthorized access are of great importance. Maybe information is created by an individual or a few people, but creating security for the information should be done by all assets of hardware, software and people. This entails organizing all elements of the system, and training and monitoring the performance of the people. One of the standards provided for the creation of security is ISMS. This standard is intended to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a system in terms of security. ISMS receives several parameters from users, assesses the risks and offers some controls (guidelines) to improve them. Collecting primary parameters is also very important in ISMS. Usually these parameters are collected personally, which result in getting inaccurate outcomes. The most important parameters include confidentiality, integrity, availability, threat and vulnerability. This paper tries to provide a method based on checklists so that by assessing the users' responses to these checklists, one can more accurately insert the vulnerability parameter value as a standard input of ISMS, in order to gain better outcomes, and more accurately perform choice of controls. In the assessment, the standard deviation method is calculated, and comparison between the common mode of ISMS and the proposed method shows that the latter works 30% better than the conventional method. People may refuse to respond sincerely due to different reasons, and the percentage of the results may differ, since the results are obtained as cross-sectional at a certain time.
机译:今天,信息正在迅速增加。对于大多数此类信息,数据安全性和防止未经授权的访问非常重要。也许信息是由一个人或几个人创建的,但是为信息创建安全性应该由硬件,软件和人员的所有资产来完成。这需要组织系统的所有元素,并培训和监视人员的绩效。 ISMS是为创建安全性而提供的标准之一。该标准旨在提供一种用于建立,实施,操作,监视,检查,维护和改进系统的安全性模型。 ISMS从用户那里接收几个参数,评估风险并提供一些控制措施(指南)以改善这些风险。在ISMS中,收集主要参数也非常重要。通常,这些参数是个人收集的,这会导致结果不准确。最重要的参数包括机密性,完整性,可用性,威胁和漏洞。本文试图提供一种基于清单的方法,以便通过评估用户对这些清单的响应,可以更准确地将漏洞参数值插入为ISMS的标准输入,从而获得更好的结果并更准确地执行选择控件。在评估中,计算了标准差方法,并且将ISMS的通用模式与所提出的方法进行比较表明,后者的效果比传统方法好30%。人们可能会因为不同的原因而拒绝做出真诚的回应,并且结果的百分比可能会有所不同,因为结果是在特定时间以横截面形式获得的。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号