2008
DOI: 10.3745/kipstc.2008.15-c.3.173
|View full text |Cite
|
Sign up to set email alerts
|

A Study on Development of Information Security Evaluation Model

Abstract: The purposes of this study is development of information security evaluation model for governments to analyze domestic and foreign existing models. Recent domestic information security certification systems have several problems, because shortage of organic connectivity each other. Therefore we analysis on domestic and foreign existing models, specify security requirements, evaluation basis and other facts of models, optimize these facts for governments, and develop new model for domestic governments.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2013
2013

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…The scoring is dependent on the implementation of each EC in an organization. The EC is then designed to evaluate current information management system using the references and standards of [3][14] [24][29] [30][31] [36][37] [38]. Moreover the EC includes standards of ISO 27001 and ISMS of Korea, and it has been completed by add of security items and modification these references to enable an organization to increase security.…”
Section: Current Level Evaluation Of Organizationmentioning
confidence: 99%
See 2 more Smart Citations
“…The scoring is dependent on the implementation of each EC in an organization. The EC is then designed to evaluate current information management system using the references and standards of [3][14] [24][29] [30][31] [36][37] [38]. Moreover the EC includes standards of ISO 27001 and ISMS of Korea, and it has been completed by add of security items and modification these references to enable an organization to increase security.…”
Section: Current Level Evaluation Of Organizationmentioning
confidence: 99%
“…Therefore, the proposed evaluation checklist can place greater emphasis on risk factors in management security. • Revision of [38], [43], and [44]: In this paper, new revision is as follows: an added and modified checklist(TC and EC), an application of quantitative and qualitative analysis methodology, a separated application of self-evaluation and evaluation committee for information security management evaluation, and an evaluation of ISMES. The best method of ISMES evaluation is a uniform application throughout the real organization.…”
Section: Ismes Evaluationmentioning
confidence: 99%
See 1 more Smart Citation