IJISC
  • Indexed in

  • Latest News

    December 29, 2018
    Volume 7, Issue 2 of the International Journal of Information Security and Cybercrime was published
    June 29, 2018
    Volume 7, Issue 1 of the International Journal of Information Security and Cybercrime was published
    December 29, 2017
    Volume 6, Issue 2 of IJISC – International Journal of Information Security and Cybercrime was published
    December 4, 2017
    IJISC has been successfully evaluated for the ICI Journals Master List 2016 and received the ICV of 85.83 points
  • --- More News ---
  • Popular Articles

  • Security Standards Analysis


    Author(s): COMȘA, Andreea-Cristina

    Quick view | Full article | Citations | Views: 1,047


    Author(s) keywords: , ,


    Reference keywords:


    Abstract:

    Today information is the basis of any organization and the business community and beyond, business security threats can be fatal causing huge loss of profit. Therefore, the importance of security is very important and should never be neglected. That has been developed for Information Security Policies that ensure confidentiality, integrity and availability of information. Thus in Europe were developed ISO/IEC 17799:2005 – “Code of practice for information security management” and ISO/IES 27001:2005 – “Specification of Information Security Management”.



    References:

    [1]. *** ISO 27001: Sistemul de management al securităţii informaţiilor – Cerinţe, 2005.

    [2]. *** ISO 27002: Codul de practică al managementului securităţii informaţiilor, 2005.

    [3]. *** ISO 17799: Final Draft - “Information technology - Security techniques - Code of practice for information security management”.

    [4]. R. J. Ellison, A. P. Moore, “Trustworthy Refinement Through Intrusion-Aware Design”, CMU/SEI-2003-TR-002, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, 2003.

    [5]. C. Huang, A. Abada, H. H. Chen and L. Cui, “A Novel Path Selection and Recovery Mechanism for MANETs P2P File Sharing Applications”, accepted for presentation in IEEE Wireless Communications & Networking Conference (WCNC) 2007, Hong Kong, 11-15 Mar. 2007.

    [6]. L. Klander, E. J. Renehan Jr., “Hacker Proof: The Ultimate Guide to Network Security”, Delmar Publishers, 2006.

    [7]. S. D. Moitra, S. L. Konda, “A Simulation Model for Managing Survivability of Networked Information Systems”, CMU/SEI-00-TR-020, Pittsburgh, PA: Software Engineering Institute, Carnegie Mellon University, Dec. 2000.



    Additional Information

    English title: Security Standards Analysis
    Original title: Analiza standardelor de securitate
    Author(s): COMȘA, Andreea-Cristina
    Article Language: Romanian
    Date of Publication: 2012-12-21
    Publication: International Journal of Information Security and Cybercrime
    ISSN: 2285-9225 e-ISSN: 2286-0096
    Digital Object Identifier: 10.19107/IJISC.2012.02.03
    Issue: Volume 1, Issue 2, Year 2012
    Section: Advances in Information Security Research
    Page Range: 25-30 (6 pages)



    Copyright

    Copyright ©2012-2019 IJISC - International Journal of Information Security and Cybercrime

    All rights reserved: International Journal of Information Security and Cybercrime is a trademark of RAISA - Romanian Association for Information Security Assurance.
    No part of this publication may be reproduced, stored in a retrieval system, photocopied, recorded or archived, without the written permission from RAISA. When authors submit their papers for publication, they agree that the copyright for their article be transferred to Romanian Association for Information Security Assurance, if the articles are accepted for publication. The copyright covers the exclusive rights to reproduce and distribute the article, including reprints and translations.