Risk identification for an information security management system implementation
ISO/IEC 27001 is an international standard that provides a set of requirements for an Information Security Management System (ISMS) implementation. A risk assessment exercise for an ISMS implementation requires human expertise with comprehensive understanding and considerable knowledge in informatio...
| Main Authors: | Ramli, Noraza, A. Aziz, Normaziah |
|---|---|
| Format: | Proceeding Paper |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/28619/ http://irep.iium.edu.my/28619/4/securware_2012_2_50_30114-1.pdf |
Similar Items
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
by: Abdul Aziz, Normaziah, et al.
Published: (2011)
Modeling of technical management information system with UML and implementation using the combination of PHP and MYSQL
by: Nik Mahamood, Nik Maria
Published: (2003)
by: Nik Mahamood, Nik Maria
Published: (2003)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017)
by: Chandio, Fida Hussain, et al.
Published: (2017)
Security based Risk Management based on Multi-Objectives Model using QPSO
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Exploring Studies of Information Security Culture in Malaysia
by: Nasir, Akhyari, et al.
Published: (2016)
by: Nasir, Akhyari, et al.
Published: (2016)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
Security risk of ATM systems, case of study
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
An analysis on the dimensions of information security culture concept: A review
by: Akhyari, Nasir, et al.
Published: (2019)
by: Akhyari, Nasir, et al.
Published: (2019)
Users' perception of the information security policy at Universiti Teknologi Malaysia
by: Sharif, Haniza
Published: (2009)
by: Sharif, Haniza
Published: (2009)
Hotel Management Information System / Mok Hei Fung
by: Mok , Hei Fung
Published: (2003)
by: Mok , Hei Fung
Published: (2003)
Hospital management information system / Yuhana Ashikin Ghazali
by: Yuhana Ashikin, Ghazali
Published: (2005)
by: Yuhana Ashikin, Ghazali
Published: (2005)
Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
by: Achin, Hamidi
Published: (2008)
by: Achin, Hamidi
Published: (2008)
Information Security Management Systems (ISMS) and Computer Security Self-Efficacy (CSSE) model comparison
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
by: Al-Shawabkeh, Mahmoud M. M., et al.
Published: (2016)
The influence of information security culture towards employee’s intention to comply with information security policy: The mediation effect of attitude, normative belief and self-efficacy
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
by: Mohd Rashid, Ab Hamid, et al.
Published: (2020)
Integrated Student Management Information System / Melissa Malathy Subramaniam
by: Melissa Malathy, Subramaniam
Published: (2001)
by: Melissa Malathy, Subramaniam
Published: (2001)
Health information management system (HIMS) / Hasnidar Muhamad Sarkan
by: Hasnidar, Muhamad Sarkan
Published: (2003)
by: Hasnidar, Muhamad Sarkan
Published: (2003)
Analysis of Information Security Resource Requirements in Local Governments
by: Toto, Suharto, et al.
Published: (2022)
by: Toto, Suharto, et al.
Published: (2022)
Information security culture for guiding employee’s security behaviour: A pilot study
by: Akhyari, Nasir, et al.
Published: (2020)
by: Akhyari, Nasir, et al.
Published: (2020)
A framework for implementation of a web-based learning management system
by: Nishtar, Fazidah, et al.
Published: (2006)
by: Nishtar, Fazidah, et al.
Published: (2006)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
Knowledge management for ERP implementation
by: Rong, Kong
Published: (2007)
by: Rong, Kong
Published: (2007)
Conceptualizing and Validating Information Security Culture as a Multidimensional Second-Order Formative Construct
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Ground penetrating radar system using OFDM technology
by: Mohamed Hassan, Ahmed Abbas, et al.
Published: (2012)
by: Mohamed Hassan, Ahmed Abbas, et al.
Published: (2012)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
CST339
–
Information Security Management and Assurance
(Pengurusan dan Jaminan Keselamatan Maklumat)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2023)
CST339 – Information Security Management and Assurance (Pengurusan dan Jaminan Keselamatan Maklumat)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2022)
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
by: Ahmad, Ab. Rahman, et al.
Published: (2005)
by: Ahmad, Ab. Rahman, et al.
Published: (2005)
A framework for knowledge management system implementation in collaborative environment for higher learning institution
by: Abdullah, Rusli, et al.
Published: (2005)
by: Abdullah, Rusli, et al.
Published: (2005)
Similar Items
-
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023) -
Secure coding in software development
by: Zainuddin @ Zenah, Nor Harisah, et al.
Published: (2011) -
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017) -
Web application - What makes it secure or insecure?
by: Abdul Aziz, Normaziah, et al.
Published: (2011) -
Secure coding in cross site scripting
by: Abdul Aziz, Normaziah, et al.
Published: (2011)