SCMM-TOOL - Tool for Computer Automation of the Information Security Management Systems

作者: Eduardo Fernández-Medina , Mario Piattini , Daniel Villafranca , Luís Enrique Sánchez

DOI:

关键词:

摘要: For enterprises to be able use information technologies and communications with guarantees, it is necessary have an adequate security management system tools which allow them manage it. In addition, must highly reduced costs for its implementation maintenance in small medium-sized (from here on refered as SMEs) feasible. this paper, we will show the tool developed using our model development, of a system, adapted needs resources SME. Furthermore, state how lets limited their very efficiently. This approach being directly applied real cases, thus obtaining constant improvement application.

参考文章(10)
Joan Hash, Mark Wilson, SP 800-50. Building an Information Technology Security Awareness and Training Program National Institute of Standards & Technology. ,(2003)
Thomas R. Peltier, Preparing for ISO 17799 Information Systems Security. ,vol. 11, pp. 21- 28 ,(2003) , 10.1201/1086/43324.11.6.20030101/40428.5
Gurpreet Dhillon, James Backhouse, Technical opinion: Information system security management in the new millennium Communications of The ACM. ,vol. 43, pp. 125- 128 ,(2000) , 10.1145/341852.341877
Carol A. Siegel, Ty R. Sagalow, Paul Serritella, Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security Information Systems Security. ,vol. 11, pp. 33- 49 ,(2002) , 10.1201/1086/43322.11.4.20020901/38843.5
Robert Garigue, Marc Stefaniu, Information Security Governance Reporting Information Systems Security. ,vol. 12, pp. 36- 40 ,(2003) , 10.1201/1079/43855.31.6.20031201/78849.3
Jongsook Lee, Jieun Lee, Seunghee Lee, Byoungju Choi, A CC-based security engineering process evaluation model computer software and applications conference. pp. 130- 135 ,(2003) , 10.1109/CMPSAC.2003.1245332
Jan H. P. Eloff, Mariki Eloff, Information security management: a new paradigm south african institute of computer scientists and information technologists. pp. 130- 136 ,(2003) , 10.5555/954014.954028