2005
DOI: 10.4301/s1807-17752005000200002
|View full text |Cite
|
Sign up to set email alerts
|

A Methodology to Implement an Information Security Management System

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Martins and Santos [12] also used the central norms and security standards to create guidelines. From that point on, they presented a proposal for a methodology to implement an information security management system (ISMS) to guarantee a networked computing environment.…”
Section: B Information Security and The Common Criteria Standardmentioning
confidence: 99%
See 2 more Smart Citations
“…Martins and Santos [12] also used the central norms and security standards to create guidelines. From that point on, they presented a proposal for a methodology to implement an information security management system (ISMS) to guarantee a networked computing environment.…”
Section: B Information Security and The Common Criteria Standardmentioning
confidence: 99%
“…Since then, this kind of application has been discussed [54] for single and mixed networks. The methodology used in [12] was a case study in an environmental protection company (predominantly private capital). As a result, the ISMS was implemented in the company, considering the particularities of its business.…”
Section: B Information Security and The Common Criteria Standardmentioning
confidence: 99%
See 1 more Smart Citation