A Model of Control Selection in Information Security Management System 


Vol. 35,  No. 8, pp. 195-204, Aug.  2010


PDF
  Abstract

As internet threats arising from hacking, the cases are increasing to introduce information security management system as an activity to let them know that the information system and information assets which companies or governments have are secure and reliable. However, as controls used in the information security management system are too generalized excessively, and research or methods related to selecting controls are insufficient, there are many difficulties in selecting them, which is a important procedure when the information security management system is established. This paper proposed the method to select controls effectively and objectively reflecting the existing literature review and the practical experience of information protection in order to figure out the problems of selecting controls of the information security management system. Selecting the controls of the information security management system using the model provided in this paper can enhance the accuracy of selection, which provide the advantage to save a lot of time and costs to be spent when introducing the information security management system.

  Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.


  Cite this article

[IEEE Style]

H. I. Jang, H. H. Han, N. Y. Lee, C. H. Cho, "A Model of Control Selection in Information Security Management System," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 8, pp. 195-204, 2010. DOI: .

[ACM Style]

Ho Ik Jang, Ho Hyeorn Han, Nam Yong Lee, and Chang Hee Cho. 2010. A Model of Control Selection in Information Security Management System. The Journal of Korean Institute of Communications and Information Sciences, 35, 8, (2010), 195-204. DOI: .

[KICS Style]

Ho Ik Jang, Ho Hyeorn Han, Nam Yong Lee, Chang Hee Cho, "A Model of Control Selection in Information Security Management System," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 8, pp. 195-204, 8. 2010.