메뉴 건너뛰기




Volumn 8431, Issue , 2014, Pages 315-344

ISMS-CORAS: A structured method for establishing an ISO 27001 compliant information security management system

Author keywords

CORAS; Information security; ISO 27001; Risk analysis; Security standard compliance

Indexed keywords

INDUSTRIAL MANAGEMENT; ISO STANDARDS; REGULATORY COMPLIANCE; RISK ANALYSIS; RISK ASSESSMENT; RISK MANAGEMENT; SECURITY OF DATA; INFORMATION MANAGEMENT; MOBILE SECURITY;

EID: 84908632947     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-07452-8_13     Document Type: Article
Times cited : (31)

References (47)
  • 1
    • 85067755309 scopus 로고    scopus 로고
    • (in French)
    • Agence nationale de la sécurité des systèmes d'information: EBIOS 2010 – Expression of Needs and Identification of Security Objectives (2010) (in French).
    • (2010)
  • 7
    • 84857324820 scopus 로고    scopus 로고
    • Supporting the development and documentation of ISO 27001 Information Security Management Systems through security requirements engineering approaches
    • In: Barthe, G., Livshits, B., Scandariato, R. (eds.), Springer, Heidelberg
    • Beckers, K., Fasbender, S., Heisel, M., Küster, J.-C., Schmidt, H.: Supporting the development and documentation of ISO 27001 Information Security Management Systems through security requirements engineering approaches. In: Barthe, G., Livshits, B., Scandariato, R. (eds.) ESSoS 2012. LNCS, vol. 7159, pp. 14–21. Springer, Heidelberg (2012).
    • (2012) Essos 2012. LNCS , vol.7159 , pp. 14-21
    • Beckers, K.1    Fasbender, S.2    Heisel, M.3    Küster, J.-C.4    Schmidt, H.5
  • 8
    • 84858326746 scopus 로고    scopus 로고
    • A pattern-based method for identifying and analyzing laws
    • In: Regnell, B., Damian, D. (eds.), Springer, Heidelberg
    • Beckers, K., Fasbender, S., Küster, J.-C., Schmidt, H.: A pattern-based method for identifying and analyzing laws. In: Regnell, B., Damian, D. (eds.) REFSQ 2011. LNCS, vol. 7195, pp. 256–262. Springer, Heidelberg (2012).
    • (2012) REFSQ 2011. LNCS , vol.7195 , pp. 256-262
    • Beckers, K.1    Fasbender, S.2    Küster, J.-C.3    Schmidt, H.4
  • 13
    • 85067779955 scopus 로고    scopus 로고
    • OpenNode project deliverable D1.2
    • Evaluation of general requirements according state of the art. OpenNode project deliverable D1.2 (2010).
    • (2010)
  • 15
    • 85067744815 scopus 로고    scopus 로고
    • (accessed January 21, 2014)
    • FREE ISO27k Toolkit, http://www.iso27001security.com/html/iso27k_toolkit.html (accessed January 21, 2014).
  • 16
    • 85067753635 scopus 로고    scopus 로고
    • OpenNode project deliverable D1.3
    • Functional use cases. OpenNode project deliverable D1.3 (2010).
    • (2010)
  • 18
    • 85067740595 scopus 로고    scopus 로고
    • International Organization for Standardization: ISO 31000 - Risk management – Principles and guidelines (2009).
    • (2009)
  • 19
    • 85067753412 scopus 로고    scopus 로고
    • International Organization for Standardization/International Electrotechnical Commission: ISO/IEC 27001 - Information technology - Security techniques - Information security management systems - Requirements (2005).
    • (2005)
  • 20
    • 85067761842 scopus 로고    scopus 로고
    • International Organization for Standardization/International Electrotechnical Commission: ISO/IEC 27005 - Information technology - Security techniques - Information security risk management (2008).
    • (2008)
  • 21
    • 85067764917 scopus 로고    scopus 로고
    • International Organization for Standardization/International Electrotechnical Commission: ISO/IEC 15408 – Common Criteria for Information Technology Security Evaluation (2009).
    • (2009)
  • 23
    • 85067751063 scopus 로고    scopus 로고
    • IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner (2011) (in German)
    • Kersten, H., Reuter, J., Schröder, K.W.: IT-Sicherheitsmanagement nach ISO 27001 und Grundschutz. Vieweg+Teubner (2011) (in German).
    • Kersten, H.1    Reuter, J.2    Schröder, K.W.3
  • 24
    • 85067744790 scopus 로고    scopus 로고
    • Information Security Risk Management mit ISO/IEC 27005: Risikomanagement mit ISO/IEC 27001, 27005 und 31010. Vieweg+Teubner, (in German)
    • Klipper, S.: Information Security Risk Management mit ISO/IEC 27005: Risikomanagement mit ISO/IEC 27001, 27005 und 31010. Vieweg+Teubner (2010) (in German).
    • (2010)
    • Klipper, S.1
  • 25
    • 84855937100 scopus 로고    scopus 로고
    • Smart metering under EU data protection law
    • Knyrim, R., Trieb, G.: Smart metering under EU data protection law. International Data Privacy Law 1(2), 121–128 (2011).
    • (2011) International Data Privacy Law , vol.1 , Issue.2 , pp. 121-128
    • Knyrim, R.1    Trieb, G.2
  • 27
    • 84875055161 scopus 로고    scopus 로고
    • Privacy-aware profiling and statistical data extraction for smart sustainable energy systems
    • Lin, H., Fang, Y.: Privacy-aware profiling and statistical data extraction for smart sustainable energy systems. IEEE Transactions on Smart Grid 4(1), 332–340 (2013).
    • (2013) IEEE Transactions on Smart Grid , vol.4 , Issue.1 , pp. 332-340
    • Lin, H.1    Fang, Y.2
  • 32
    • 33750273034 scopus 로고    scopus 로고
    • Applying a security requirements engineering process
    • In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.), Springer, Heidelberg
    • Mellado, D., Fernández-Medina, E., Piattini, M.: Applying a security requirements engineering process. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 192–206. Springer, Heidelberg (2006).
    • (2006) ESORICS 2006. LNCS , vol.4189 , pp. 192-206
    • Mellado, D.1    Fernández-Medina, E.2    Piattini, M.3
  • 33
    • 85067744252 scopus 로고    scopus 로고
    • Microsoft Solutions for Security and Compliance and Microsoft Security Center of Excellence: The Security Risk Management Guide (2006).
    • (2006)
  • 35
    • 85067764428 scopus 로고    scopus 로고
    • (accessed December 19, 2013)
    • Network of Excellence on Engineering Secure Future Internet Software Services and Systems (NESSoS), http://www.nessos-project.eu/ (accessed December 19, 2013).
  • 36
    • 85067744309 scopus 로고    scopus 로고
    • Superstructure. Version 2.3, OMG Document: formal/2010-05-03
    • Object Management Group: OMG Unified Modeling Language (OMG UML), Superstructure. Version 2.3, OMG Document: formal/2010-05-03 (2010).
    • (2010)
  • 37
    • 60949097689 scopus 로고    scopus 로고
    • Experimental comparison of attack trees and misuse cases for security threat identification
    • Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51, 916–932 (2009).
    • (2009) Inf. Softw. Technol , vol.51 , pp. 916-932
    • Opdahl, A.L.1    Sindre, G.2
  • 40
    • 85067775113 scopus 로고    scopus 로고
    • OPEN meter project deliverable D1.1
    • Report on the identification and specification of functional, technical, economical and general requirements of advanced multi-metering infrastructure, including security requirements. OPEN meter project deliverable D1.1 (2009).
    • (2009)
  • 42
    • 85067745061 scopus 로고    scopus 로고
    • (accessed: January 15, 2013)
    • Siemens: CRAMM - The total information security toolkit, http://www.cramm.com/ (accessed: January 15, 2013).
  • 43
    • 85067774660 scopus 로고    scopus 로고
    • (accessed December 19, 2013)
    • Siemens: No longer a one-way street, http://www.siemens.com/innovation/apps/pofmicrosite/ pof-spring-2011/html en/smart-grids.html (accessed December 19, 2013).
  • 46
    • 84881138235 scopus 로고    scopus 로고
    • An approach to select cost-effective risk countermeasures
    • In: Wang, L., Shafiq, B. (eds.), Springer, Heidelberg
    • Tran, L.M.S., Solhaug, B., Stolen, K.: An approach to select cost-effective risk countermeasures. In: Wang, L., Shafiq, B. (eds.) DBSec 2013. LNCS, vol. 7964, pp. 266–273. Springer, Heidelberg (2013).
    • (2013) Dbsec 2013. LNCS , vol.7964 , pp. 266-273
    • Tran, L.1    Solhaug, B.2    Stolen, K.3
  • 47
    • 85067757021 scopus 로고    scopus 로고
    • (accessed January 21, 2014)
    • verinice, http://www.verinice.org (accessed January 21, 2014).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.