A study on comparative analysis of the information security management systems

Heasuk Jo, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages510-519
Number of pages10
Volume6019 LNCS
EditionPART 4
DOIs
Publication statusPublished - 2010 May 20
Externally publishedYes
Event2010 International Conference on Computational Science and Its Applications, ICCSA 2010 - Fukuoka, Japan
Duration: 2010 Mar 232010 Mar 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 4
Volume6019 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2010 International Conference on Computational Science and Its Applications, ICCSA 2010
CountryJapan
CityFukuoka
Period10/3/2310/3/26

    Fingerprint

Keywords

  • Information Security Check
  • Information Security Evaluation
  • Information Security Evaluation Process
  • Information Security Management System(ISMS)

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Jo, H., Kim, S-J., & Won, D. (2010). A study on comparative analysis of the information security management systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (PART 4 ed., Vol. 6019 LNCS, pp. 510-519). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6019 LNCS, No. PART 4). https://doi.org/10.1007/978-3-642-12189-0-44