The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector

Author:

Kitsios Fotis1ORCID,Chatzidimitriou Elpiniki1,Kamariotou Maria1ORCID

Affiliation:

1. Department of Applied Informatics, University of Macedonia, 54636 Thessaloniki, Greece

Abstract

In order to handle their regulatory and legal responsibilities and to retain trustworthy strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy, accessibility, and authenticity of the data at their disposal. Companies can become more resilient in the face of information security threats and cyberattacks by effectively integrating security strategies. The goal of this article is to describe a plan that a corporation has implemented in the information technology industry in order to ensure compliance with International Organization for Standardization (ISO) 27001. This research demonstrates an examination of the reasons that force enterprises to make a investment in ISO 27001 in addition to the incentives that might be acquired from having undergone this process. In addition, the research examines the reasons that push firms to make an investment in ISO 27001. More particularly, the research investigates an international IT consulting services institution that is responsible for the implementation of large-scale business assistance insertion and projects. It demonstrates the risk management framework and the administrative structure of the appropriate situations so that its procedures are adequate and also in line with the guidelines founded by ISO 27001. In conclusion, it discusses the problems and difficulties that were experienced.

Publisher

MDPI AG

Subject

Management, Monitoring, Policy and Law,Renewable Energy, Sustainability and the Environment,Geography, Planning and Development,Building and Construction

Reference56 articles.

1. Organizational objectives for information security governance: A value focused assessment;Mishra;Inf. Comput. Secur.,2015

2. A process model for implementing information systems security governance;Nicho;Inf. Comput. Secur.,2018

3. The effect of information security certification announcements on the market value of the firm;Deane;Inf. Technol. Manag.,2019

4. Information security risks management framework–A step towards mitigating security risks in university network;Joshi;J. Inf. Secur. Appl.,2017

5. Impact of Cyberattacks by Malicious Hackers on the Competition in Software Markets;Sen;J. Manag. Inf. Syst.,2020

Cited by 17 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. User Mobility Modeling in Crowdsourcing Application to Prevent Inference Attacks;Future Internet;2024-08-28

2. Data Security and Privacy in RegTech;Advances in Finance, Accounting, and Economics;2024-06-28

3. Reimagining Digital Health: Innovations in Virtual Health Service Design;2024 5th Technology Innovation Management and Engineering Science International Conference (TIMES-iCON);2024-06-19

4. Process security methods and measurement in the context of standard management systems;Engineering Management in Production and Services;2024-06-01

5. Robust intrusion detection for network communication on the Internet of Things: a hybrid machine learning approach;Cluster Computing;2024-05-03

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3