Παρακαλώ χρησιμοποιήστε αυτό το αναγνωριστικό για να παραπέμψετε ή να δημιουργήσετε σύνδεσμο προς αυτό το τεκμήριο:
https://ruomo.lib.uom.gr/handle/7000/1733
Πλήρης εγγραφή μεταδεδομένων
Πεδίο DC | Τιμή | Γλώσσα |
---|---|---|
dc.contributor.author | Kitsios, Fotis | - |
dc.contributor.author | Chatzidimitriou, Elpiniki | - |
dc.contributor.author | Kamariotou, Maria | - |
dc.date.accessioned | 2023-11-13T19:14:12Z | - |
dc.date.available | 2023-11-13T19:14:12Z | - |
dc.date.issued | 2022-01-24 | - |
dc.identifier | 10.3390/su14031269 | en_US |
dc.identifier.issn | 2071-1050 | en_US |
dc.identifier.uri | https://doi.org/10.3390/su14031269 | en_US |
dc.identifier.uri | https://ruomo.lib.uom.gr/handle/7000/1733 | - |
dc.description.abstract | Organizations must be committed to ensuring the confidentiality, availability, and integrity of the information in their possession to manage legal and regulatory obligations and to maintain trusted business relationships. Information security management systems (ISMSs) support companies to better deal with information security risks and cyber-attacks. Although there are many different approaches to successfully implementing an ISMS in a company, the most important and time-consuming part of establishing an ISMS is a risk assessment. The purpose of this paper was to develop a risk assessment framework that a company followed in the information technology sector to conduct the risk assessment process to comply with International Organization for Standardization (ISO) 27001. The findings analyze the conditions that force organizations to invest in protecting information and the benefits they can derive from this process. In particular, the paper delves into a multinational IT consulting services company that undertakes and implements large business support installation and customization projects. It explains the risk assessment process and the management of the necessary configurations so that its functions are acceptable and in line with information security standards. Finally, it presents the difficulties and challenges encountered. | en_US |
dc.language.iso | en | en_US |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | * |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | * |
dc.source | Sustainability | en_US |
dc.subject | FRASCATI::Social sciences | en_US |
dc.subject | FRASCATI::Engineering and technology | en_US |
dc.subject.other | information security management system (ISMS) | en_US |
dc.subject.other | ISO 27001 | en_US |
dc.subject.other | software consulting company | en_US |
dc.subject.other | risk analysis | en_US |
dc.subject.other | impact assessment | en_US |
dc.title | Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems: A Case Study in IT Consulting Industry | en_US |
dc.type | Article | en_US |
dc.contributor.department | Τμήμα Εφαρμοσμένης Πληροφορικής | en_US |
local.identifier.volume | 14 | en_US |
local.identifier.issue | 3 | en_US |
local.identifier.firstpage | 1269 | en_US |
Εμφανίζεται στις Συλλογές: | Τμήμα Εφαρμοσμένης Πληροφορικής |
Αρχεία σε αυτό το Τεκμήριο:
Αρχείο | Περιγραφή | Μέγεθος | Μορφότυπος | |
---|---|---|---|---|
Developing a Risk Analysis Strategy Framework for Impact Assessment in Information Security Management Systems.pdf | 590,89 kB | Adobe PDF | Προβολή/Ανοιγμα |
Αυτό το τεκμήριο προστατεύεται από Αδεια Creative Commons