A study on comparative analysis of the information security management systems

Heasuk Jo, Seung-Joo Kim, Dongho Won

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages510-519
Number of pages10
Volume6019 LNCS
EditionPART 4
DOIs
Publication statusPublished - 2010 May 20
Externally publishedYes
Event2010 International Conference on Computational Science and Its Applications, ICCSA 2010 - Fukuoka, Japan
Duration: 2010 Mar 232010 Mar 26

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
NumberPART 4
Volume6019 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other2010 International Conference on Computational Science and Its Applications, ICCSA 2010
CountryJapan
CityFukuoka
Period10/3/2310/3/26

Fingerprint

Information Security
Security of data
Comparative Analysis
Certification
Industry
Banking
Electronic commerce
Mobile Networks
Electronic Commerce
Japan
Baseline
Wireless networks
Customers
Internet
Evaluation
Business
Government

Keywords

  • Information Security Check
  • Information Security Evaluation
  • Information Security Evaluation Process
  • Information Security Management System(ISMS)

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this

Jo, H., Kim, S-J., & Won, D. (2010). A study on comparative analysis of the information security management systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (PART 4 ed., Vol. 6019 LNCS, pp. 510-519). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6019 LNCS, No. PART 4). https://doi.org/10.1007/978-3-642-12189-0-44

A study on comparative analysis of the information security management systems. / Jo, Heasuk; Kim, Seung-Joo; Won, Dongho.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6019 LNCS PART 4. ed. 2010. p. 510-519 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 6019 LNCS, No. PART 4).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jo, H, Kim, S-J & Won, D 2010, A study on comparative analysis of the information security management systems. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 4 edn, vol. 6019 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), no. PART 4, vol. 6019 LNCS, pp. 510-519, 2010 International Conference on Computational Science and Its Applications, ICCSA 2010, Fukuoka, Japan, 10/3/23. https://doi.org/10.1007/978-3-642-12189-0-44
Jo H, Kim S-J, Won D. A study on comparative analysis of the information security management systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PART 4 ed. Vol. 6019 LNCS. 2010. p. 510-519. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 4). https://doi.org/10.1007/978-3-642-12189-0-44
Jo, Heasuk ; Kim, Seung-Joo ; Won, Dongho. / A study on comparative analysis of the information security management systems. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 6019 LNCS PART 4. ed. 2010. pp. 510-519 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); PART 4).
@inproceedings{4d422b6646384906a71d771c61e62e2b,
title = "A study on comparative analysis of the information security management systems",
abstract = "Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.",
keywords = "Information Security Check, Information Security Evaluation, Information Security Evaluation Process, Information Security Management System(ISMS)",
author = "Heasuk Jo and Seung-Joo Kim and Dongho Won",
year = "2010",
month = "5",
day = "20",
doi = "10.1007/978-3-642-12189-0-44",
language = "English",
isbn = "3642121888",
volume = "6019 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
number = "PART 4",
pages = "510--519",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
edition = "PART 4",

}

TY - GEN

T1 - A study on comparative analysis of the information security management systems

AU - Jo, Heasuk

AU - Kim, Seung-Joo

AU - Won, Dongho

PY - 2010/5/20

Y1 - 2010/5/20

N2 - Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.

AB - Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization. The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.

KW - Information Security Check

KW - Information Security Evaluation

KW - Information Security Evaluation Process

KW - Information Security Management System(ISMS)

UR - http://www.scopus.com/inward/record.url?scp=77952314021&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=77952314021&partnerID=8YFLogxK

U2 - 10.1007/978-3-642-12189-0-44

DO - 10.1007/978-3-642-12189-0-44

M3 - Conference contribution

SN - 3642121888

SN - 9783642121883

VL - 6019 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 510

EP - 519

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -