Practical Shortcoming in Implementation of Information Security Management Systems

Authors

Keywords:

Cyber Security, Information Security, ISO27001

Abstract

Information security has always been a global challenge and has gone even tougher with the revolutionary updates in technologies and easier reach to the information in digital form. Protection of vital information about business and persons (staff, vendors, and customers) has always been a big challenge for organizations from every market segment. Companies have been spending a big part of their revenue on ensuring information security and many international standards have been defined for this. Yet, the challenge is continuously increasing and so is the budget spent on it.

This white paper highlights some most practical shortcomings in the security systems common for multiple market segments.

References

Albert Caballero (2009), Computer and Information Security Handbook, Morgan Kaufmann Publications Elsevier Inc p. 232 ISBN 978-0-12-374354-1

An Introduction to BS7799, DOI: http://gtechindia.org/jsp/BS7799TrivandrumSPIN.ppt

Craig S Wright, SANS Darling Harbour (2005) Implementing an Information Security Management System (ISMS) Training process, Global Information Assurance Certification Paper taken from the GIAC directory of certified professionals, SANS Institute; DOI: http://www.giac.org/paper/g2700/39/implementing-information-security-management-system-isms-training-process/107335

Inger Nordin (2003). "Implementation of an ISMS - A process approach". URL: http://www.ivpk.lt/dokumentai/prezentacijos/09%20Information%20Security20Management%20System%20-%20Implementatio.ppt

Inger Nordin (2003). "Information Security Management System (ISMS) – Introduction". URL: http://www.ivpk.lt/dokumentai/prezentacijos/08%20Information%20Security%20Management%20System%20-%20Introduction.ppt

Shamsuddin Abdul Jalil and Rafidah Abdul Hamid (2019). Cyber Security Malaysia. URL: https://www.cybersecurity.my/data/content_files/11/23.pdf

MAKINO Tsutomu (2012), How to Establish an ISMS Management Framework, JIPDEC, DOI: http://www.isms.jipdec.jp/en/isms/frame.html

Punhani, R., Kakkar, A., & Jain, D. (2012). Implementation of ISMS and its Practical Shortcomings. IARS’ International Research Journal, 2(1). Retrieved from https://researth.iars.info/index.php/curie/article/view/19

Rana, A., Nigam, U., & Jain, D. (2012). Insider Threats: Risk to Organization. IARS’ International Research Journal, 2(1). Retrieved from https://researth.iars.info/index.php/curie/article/view/18

Shamsuddin Abdul Jalil, Rafidah Abdul Hamid (2003), ISMS Pilot Program Experiences: Benefits, Challenges & Recommendations, DOI: http://www.cybersecurity.my/data/content_files/11/23.pdf

The National ICT Security and Emergency Response Centre (NISER) (2012), NISER'S ISMS PILOT PROGRAMME EXPERIENCES: COMMON SHORTCOMINGS IN ISMS IMPLEMENTATION, DOI: http://www.cybersecurity.my/data/content_files/11/24.pdf

Downloads

Published

2019-12-23

How to Cite

Jain, D., Kakkar, A., & Punhani, R. (2019). Practical Shortcoming in Implementation of Information Security Management Systems. JS International Journal of Multidisciplinary Research, 1(1). Retrieved from https://jconsortium.com/index.php/jsijmr/article/view/437

ARK

Most read articles by the same author(s)