ISO 27002 THESIS

Poepjes, Robert The development and evaluation of an information security awareness capability model: The answer is usability — if it was a single standard, it would be too complex and too large for practical use. Any prudent householder whose house was built on the shores of a tidal river would, when facing the risk of floods, take urgent steps to improve the defences of the house against the water. Content of the ISO Standard The standard encompasses 11 control objectives and a total of 39 controls within of the standard. I accept I decline. Call us at Request a Quote Keep If you are human, leave this field blank. This research extends existing literature by contributing an approach and empirical model for measuring the required importance and capability of information security awareness within an organisation, thus identifying potential information security risks.

The organizations allocated too little time to invest in this research, due to other priorities. Management review of the ISMS – management must review the suitability, adequacy and effectiveness of the ISMS at least once a year, assessing opportunities for improvement and the need for changes. Implementing ISO is the right way forward to ensure the security of an organization. So, it was hard to evaluate information security from an economic perspective. So, it was hard to evaluate information security from an economic perspective.

ISO 27001 vs. ISO 27002

Every standard from the ISO series is designed with a certain focus — if you want to build the foundations of information security in 20702 organization, and devise its framework, you should use ISO ; if you want to implement controls, you should iiso ISOif you want to carry out risk assessment and risk treatment, you should use ISO etc.

Implementing ISO can take time and consume unforeseen resources, especially if companies don’t have an implementation plan early in the compliance process. This category of consequences have a high negative impact on employee morale and motivation and hence productivity.

During the research several areas of attention were identified, that require additional research to increase understanding of the economic evaluation of information security further.

A key issue is that ISO thesls a management standard, not a security standard.

  KGMC THESIS TOPICS

ISO vs ISO Which Standard Is Best for Your Organization?

Appropriate steps should be taken to secure and protect information assets; it is no longer acceptable to just be compliant. The analysis results support organizations and security managers at identifying systems they can use to achieve greater efficiency in the information security management process.

iso 27002 thesis

For example, when crossing a busy street it would be important to be aware of oncoming traffic before crossing. Content of the ISO Standard The standard encompasses 11 control objectives and a total of 39 controls within of the standard. ISO is an effective protective system against information security incidents having critical consequences.

Statistics for this ePrint Item. Given the immense value of information to the organization, securing information assets through a system of information security is of very importance.

The logical answer would be…not necessarily. ISO is in the nature of a non-prescriptive framework as it is technology and vendor neutral standard, which provides to the organization and sio its stakeholders a level of confidence regarding its information security, measures.

ISO vs. ISO – What’s the difference?

The key findings illustrate that the required importance of awareness of information security controls differs from control to control, and differs depending on which stakeholder is involved.

User and system level passwords should be changed frequently.

iso 27002 thesis

The interviews were not structured to a great extent because our main goal was to carry out the questions with the interviewees, which could result in more discussions regarding the subject. The results support organizations and security managers at identifying systems they can use to achieve greater efficiency in the thesie security management process. The passwords should be kept secured and user accounts should not be shared.

With new challenges and threats emerging almost daily, any breach to security can have a severe effect on the function, reputation, or survival of the organization. All organizations possess information, or data, that is either critical or sensitive. It is perfectly possible to implement an ISO compliant information security management system ISMS without adequately addressing information security.

  MARRAKECH BY GEORGE ORWELL CRITICAL ESSAY

External consultants should work in collaboration with an internal team of representatives from the company’s major business units. This requires information risk management and security expertise to implement. In order to decrease the probability of operational risks and to enhance information security, it is recommended that any information that users consider sensitive or vulnerable thsis be encrypted.

An example could be sub-contracting a part of the contracted work involving sharing of information without taking due clearance from all stakeholders concerned. It relates to the comprehension of a current situation and, for example, before a person crosses a street, are they aware or capable of comprehending the situation of the oncoming traffic?

ISO 27001 vs ISO 27002: Which Standard Is Best for Your Organization?

The interviews were not structured to a great extent because our main goal was to thezis out the questions with the interviewees, which could result in more discussions regarding the subject. Secondary data was our second source of information.

The researcher concludes that the model developed will assist organisations in identifying awareness gaps and associated risks for specific information security control objectives across an organisation.

The analysis of variance ANOVA is a flexible statistical procedure that can be used when the researcher wishes to compare differences between more than two means. Review the methods used within the organization to obtain the relevant content Investigate how tooling can be used to record the relevant content.

It was difficult to assess the cost-effectiveness of the security controls due to unavailability of isp relevant content. Above all, the fact that this research concerns a first study in this field of research implies that further research has to be done to validate the conclusions and recommendations. Information; organizations need to prove they are secure. The Need for Information Security is according to the different categories of impact level of information.