메뉴 건너뛰기




Volumn , Issue , 2008, Pages 391-398

Practical application of a security management maturity model for SMES based on predefined schemas

Author keywords

Information security management system; ISMS; ISO27001; Maturity level; Security system; Small medium size enterprise; SME

Indexed keywords

APPLICATIONS; CRYPTOGRAPHY; ELECTRIC ENERGY STORAGE; INDUSTRIAL MANAGEMENT; SECURITY SYSTEMS;

EID: 58049181431     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (19)
  • 8
    • 28044457328 scopus 로고    scopus 로고
    • ISO/IEC 17799. Information Technology - Security techniques - Code of practice for information security management
    • ISO/IEC 17799
    • ISO/IEC 17799 (2000). ISO/IEC 17799. Information Technology - Security techniques - Code of practice for information security management.
    • (2000)
  • 9
    • 33746758956 scopus 로고    scopus 로고
    • ISO/IEC 17799. Information Technology - Security techniques - Code of practice for information security management
    • ISO/IEC 17799
    • ISO/IEC 17799 (2005). ISO/IEC 17799. Information Technology - Security techniques - Code of practice for information security management.
    • (2005)
  • 10
    • 58049135056 scopus 로고    scopus 로고
    • ISO/IEC27002 (2007). ISO/IEC 27002:2005, the international standard Code of Practice for Information Security Management (en desarrollo).
    • ISO/IEC27002 (2007). "ISO/IEC 27002:2005, the international standard Code of Practice for Information Security Management (en desarrollo)."
  • 11
    • 0345097590 scopus 로고    scopus 로고
    • Lee, J, J. Lee, et al, 2003, A CC-based Security Engineering Process Evaluation Model. Proceedings of the 27th Annual International Computer Software and Applications Conference COMPSAC
    • Lee, J., J. Lee, et al. (2003). A CC-based Security Engineering Process Evaluation Model. Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC).
  • 12
  • 13
    • 58149112795 scopus 로고    scopus 로고
    • MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs
    • Funchal, Madeira Portugal, June
    • Sánchez, L. E., D. Villafranca, et al. (2007b). MMISS-SME Practical Development: Maturity Model for Information Systems Security Management in SMEs. 9th International Conference on Enterprise Information Systems (WOSIS'07). Funchal, Madeira (Portugal). June.
    • (2007) 9th International Conference on Enterprise Information Systems (WOSIS'07)
    • Sánchez, L.E.1    Villafranca, D.2
  • 15
    • 84947221464 scopus 로고    scopus 로고
    • Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security
    • sept/oct
    • Siegel, C. A., T. R. Sagalow, et al. (2002). "Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security." Security Management Practices sept/oct: 33-49.
    • (2002) Security Management Practices , pp. 33-49
    • Siegel, C.A.1    Sagalow, T.R.2
  • 16
    • 58049152987 scopus 로고    scopus 로고
    • Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis
    • Boston
    • Telang, R. and S. Wattal (2005). Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis. 4h Workshop on Economics and Information Security, Boston.
    • (2005) Workshop on Economics and Information Security
    • Telang, R.1    Wattal, S.2
  • 17
    • 0034954816 scopus 로고    scopus 로고
    • Incremental Information Security Certification
    • Von Solms, B. and R. Von Solms (2001). "Incremental Information Security Certification." Computers & Security 20: 308-310.
    • (2001) Computers & Security , vol.20 , pp. 308-310
    • Von Solms, B.1    Von Solms, R.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.