Practical Shortcoming in Implementation of Information Security Management Systems
Keywords:
Cyber Security, Information Security, ISO27001Abstract
Information security has always been a global challenge and has gone even tougher with the revolutionary updates in technologies and easier reach to the information in digital form. Protection of vital information about business and persons (staff, vendors, and customers) has always been a big challenge for organizations from every market segment. Companies have been spending a big part of their revenue on ensuring information security and many international standards have been defined for this. Yet, the challenge is continuously increasing and so is the budget spent on it.
This white paper highlights some most practical shortcomings in the security systems common for multiple market segments.
References
Albert Caballero (2009), Computer and Information Security Handbook, Morgan Kaufmann Publications Elsevier Inc p. 232 ISBN 978-0-12-374354-1
An Introduction to BS7799, DOI: http://gtechindia.org/jsp/BS7799TrivandrumSPIN.ppt
Craig S Wright, SANS Darling Harbour (2005) Implementing an Information Security Management System (ISMS) Training process, Global Information Assurance Certification Paper taken from the GIAC directory of certified professionals, SANS Institute; DOI: http://www.giac.org/paper/g2700/39/implementing-information-security-management-system-isms-training-process/107335
Inger Nordin (2003). "Implementation of an ISMS - A process approach". URL: http://www.ivpk.lt/dokumentai/prezentacijos/09%20Information%20Security20Management%20System%20-%20Implementatio.ppt
Inger Nordin (2003). "Information Security Management System (ISMS) – Introduction". URL: http://www.ivpk.lt/dokumentai/prezentacijos/08%20Information%20Security%20Management%20System%20-%20Introduction.ppt
Shamsuddin Abdul Jalil and Rafidah Abdul Hamid (2019). Cyber Security Malaysia. URL: https://www.cybersecurity.my/data/content_files/11/23.pdf
MAKINO Tsutomu (2012), How to Establish an ISMS Management Framework, JIPDEC, DOI: http://www.isms.jipdec.jp/en/isms/frame.html
Punhani, R., Kakkar, A., & Jain, D. (2012). Implementation of ISMS and its Practical Shortcomings. IARS’ International Research Journal, 2(1). Retrieved from https://researth.iars.info/index.php/curie/article/view/19
Rana, A., Nigam, U., & Jain, D. (2012). Insider Threats: Risk to Organization. IARS’ International Research Journal, 2(1). Retrieved from https://researth.iars.info/index.php/curie/article/view/18
Shamsuddin Abdul Jalil, Rafidah Abdul Hamid (2003), ISMS Pilot Program Experiences: Benefits, Challenges & Recommendations, DOI: http://www.cybersecurity.my/data/content_files/11/23.pdf
The National ICT Security and Emergency Response Centre (NISER) (2012), NISER'S ISMS PILOT PROGRAMME EXPERIENCES: COMMON SHORTCOMINGS IN ISMS IMPLEMENTATION, DOI: http://www.cybersecurity.my/data/content_files/11/24.pdf
Downloads
Published
How to Cite
Issue
Section
ARK
License
Copyright (c) 2021 Prof. (Dr.) D. Jain, Alpana Kakkar, Ritu Punhani
This work is licensed under a Creative Commons Attribution 4.0 International License.