Information System Security Evaluation Using Cobit 5 Framework (original) (raw)

Integration of COBIT, Balanced Scor ecar d and SSE- CMM as a strategic Infor mation Security Management (ISM) fr amewor k

ALEJANDRO INDARTE

View PDFchevron_right

ACADEMIC INFORMATION SYSTEM SECURITY AUDITS USING COBIT 5 FRAMEWORK DOMAINS APO12, APO13 AND DSS05

Yoga Megasyah

JOURNAL OF APPLIED ENGINEERING AND TECHNOLOGICAL SCIENCE (JAETS), 2020

View PDFchevron_right

Information Security Evaluation of Data Centre Architecture Using COBIT 5

48_M. Shidqa Irahman

2023

View PDFchevron_right

Evaluation of Basic Principles of Information Security at University Using COBIT 5

Khairunnisak Nur Isnaini

MATRIK : Jurnal Manajemen, Teknik Informatika dan Rekayasa Komputer

View PDFchevron_right

A Framework for Evaluation of Information Systems Security

Job Chaula

2005

View PDFchevron_right

SECURITY METRICS AND EVALUATION OF INFORMATION SYSTEMS SECURITY

Job Chaula

View PDFchevron_right

The Evaluation of Information Security in Organizations, Using the CVSS Scoring System

Virtyt Lesha

The 1st International Conference on Internet …, 2012

View PDFchevron_right

Evaluation and Comparison of Cobit, Itil and ISO27K1/2 Standards Within the Framework of Information Security

Bahadir Kandemirli

2015

View PDFchevron_right

A framework for information security evaluation

William Caelli

Information & Management, 1994

View PDFchevron_right

An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls

Razieh Sheikhpour

View PDFchevron_right

Action Design of Information Systems Security Governance for Bank Using COBIT 4.1 and Control Standard of ISO 27001

Nugroho J Setiadi

Advanced Materials Research, 2014

View PDFchevron_right

Koskosas I. A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES 5 Business Excellence and Management Volume 3 Issue 2 / A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES

Nhalyn Romances

View PDFchevron_right

ICT security management

Jeanne Schreurs

2007

View PDFchevron_right

Governing Information Security in Conjunction with COBIT and ISO 27001

Tolga Mataracioglu, Sevgi Ozkan Yıldırım

International Journal of Computer Science and Information Technology, 2011

View PDFchevron_right

Information Systems Security

shyamasundar R.K.

Lecture Notes in Computer Science

View PDFchevron_right

Advanced Information Security Management Evaluation System

Seungjoo Kim

KSII Transactions on Internet and Information Systems, 2011

View PDFchevron_right

Information technology -Security techniques -Evaluation criteria for IT security - Part 1: Introduction and general model

mayerli Alarcón

View PDFchevron_right

Information Systems Security Management: A Review and a Classification of the ISO Standards

Spyros Kokolakis

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 2010

View PDFchevron_right

Security evaluation in information technology standards

Emilio Montolivo

Computers & Security, 1994

View PDFchevron_right

Mini Track:'Information Systems Security Management

Marios Koufaris

2005

View PDFchevron_right

A Critical Analysis of Information Security -A Case Study of Cognizant Technology Solutions

Anvar Shathik, Srinivas Publication

SRINIVAS PUBLICATION, 2020

View PDFchevron_right

Information Security Assessment: Procedures and Methodology

Dario Forte

Computer Fraud & Security, 2000

View PDFchevron_right

DIAGNOSING THE CURRENT INFORMATION SYSTEMS SECURITY DEPARTMENT IN THE INFORMATION TECHNOLOGY DEPARTMENT ACCORDING TO THE INTERNATIONAL STANDARD (ISO / IEC 27001: 2013

احمد مكي

View PDFchevron_right

A Maturity Level Framework for Measurement of Information Security Performance

Yusuf Yudi Prayudi

International Journal of Computer Applications, 2016

View PDFchevron_right

A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES

DANMARCK SUMAOANG

View PDFchevron_right

Managing Information Systems Security: Critical Success Factors and Indicators to Measure Effectiveness

Nícolas Serrano

Lecture Notes in Computer Science, 2006

View PDFchevron_right

The Organisational Information Security Profile - A Tool to Assist The Board

Helen De Haar

2006

View PDFchevron_right

Information Security Management on performance of Information Systems Management

Shahram Gilaninia

2012

View PDFchevron_right

3.2.1 System Security Capability Assessment Model Development and Application

Barbara EndicottPopovsky

INCOSE International Symposium, 2010

View PDFchevron_right

INFORMATION SECURITY SYSTEM AND DEVELOPMENT OF A MODERN ORGANIZATION

Slawomir Wawak

Journal of the Washington Institute of China Studies, 2009

View PDFchevron_right