IJISC
  • Indexed in

  • Latest News

    December 30, 2024
    Volume 13, Issue 2 of the International Journal of Information Security and Cybercrime was published
    July 1, 2024
    Volume 13, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 27, 2023
    Volume 12, Issue 2 of the International Journal of Information Security and Cybercrime was published
  • --- More News ---
  • Popular Articles

  • Security Standards Analysis


    Author(s): COMȘA, Andreea-Cristina

    Quick view | Full article | Citations | Views: 1,506


    Author(s) keywords: , ,


    Reference keywords:


    Abstract:

    Today information is the basis of any organization and the business community and beyond, business security threats can be fatal causing huge loss of profit. Therefore, the importance of security is very important and should never be neglected. That has been developed for Information Security Policies that ensure confidentiality, integrity and availability of information. Thus in Europe were developed ISO/IEC 17799:2005 – “Code of practice for information security management” and ISO/IES 27001:2005 – “Specification of Information Security Management”.



    References:

    [1]. *** ISO 27001: Sistemul de management al securităţii informaţiilor – Cerinţe, 2005.

    [2]. *** ISO 27002: Codul de practică al managementului securităţii informaţiilor, 2005.

    [3]. *** ISO 17799: Final Draft - “Information technology - Security techniques - Code of practice for information security management”.

    [4]. R. J. Ellison, A. P. Moore, “Trustworthy Refinement Through Intrusion-Aware Design”, CMU/SEI-2003-TR-002, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2003.

    [5]. C. Huang, A. Abada, H. H. Chen and L. Cui, “A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications”, accepted for presentation in IEEE Wireless Communications & Networking Conference (WCNC) 2007, Hong Kong, 11-15 Mar. 2007.

    [6]. L. Klander, E. J. Renehan Jr., “Hacker Proof: The Ultimate Guide to Network Security”, Delmar Publishers, 2006.

    [7]. S. D. Moitra, S. L. Konda, “A Simulation Model for Managing Survivability of Networked Information Systems”, CMU/SEI-00-TR-020, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Dec. 2000.



    Additional Information

    English title: Security Standards Analysis
    Original title: Analiza standardelor de securitate
    Author(s): COMȘA, Andreea-Cristina
    Article Language: Romanian
    Date of Publication: 2012-12-21
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2012.02.03
    Issue: Volume 1, Issue 2, Year 2012
    Section: Advances in Information Security Research
    Page Range: 25-30 (6 pages)



    Copyright ©2012-2025
    The International Journal of Information Security and Cybercrime (IJISC)

    All rights reserved
    The International Journal of Information Security and Cybercrime is a trademark of the Romanian Association for Information Security Assurance (RAISA).
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to the Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.