2023
DOI: 10.3390/su15075828
|View full text |Cite
|
Sign up to set email alerts
|

The ISO/IEC 27001 Information Security Management Standard: How to Extract Value from Data in the IT Sector

Abstract: In order to handle their regulatory and legal responsibilities and to retain trustworthy strategic partnerships, enterprises need to be dedicated to guaranteeing the privacy, accessibility, and authenticity of the data at their disposal. Companies can become more resilient in the face of information security threats and cyberattacks by effectively integrating security strategies. The goal of this article is to describe a plan that a corporation has implemented in the information technology industry in order to… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7
3

Relationship

0
10

Authors

Journals

citations
Cited by 18 publications
(5 citation statements)
references
References 54 publications
(103 reference statements)
0
1
0
Order By: Relevance
“…• expand or improve end-user awareness, • conduct regular security workshops and trainings, • communicate the security policies and the values that determine how people are expected to think about and approach security in the organisation, • delegate someone to champion the security culture processes, • ensure that the system is patched, These results point to the inefficiency of the present security culture. The International Organization for Standardization's IS management system (ISO/IEC 27001:2022) includes processes and activities related to IS awareness (Kitsios, Chatzidimitriou, & Kamariotou, 2023).…”
Section: Information Security Culturementioning
confidence: 99%
“…• expand or improve end-user awareness, • conduct regular security workshops and trainings, • communicate the security policies and the values that determine how people are expected to think about and approach security in the organisation, • delegate someone to champion the security culture processes, • ensure that the system is patched, These results point to the inefficiency of the present security culture. The International Organization for Standardization's IS management system (ISO/IEC 27001:2022) includes processes and activities related to IS awareness (Kitsios, Chatzidimitriou, & Kamariotou, 2023).…”
Section: Information Security Culturementioning
confidence: 99%
“…On the other hand, it also brings major challenges to the security and protection of medical data. Therefore, we need to robustly deploy security and privacy controls (e.g., NIST SP800-30, ISO 27001, ISO/IEC Standard 27018 [ 5 , 6 ]) to protect medical data prevalent on the Internet from becoming prey to hackers. In this context, many research topics have received attention, including, but not limited to, the following: risk assessment, device security, session security, cloud security, data protection, and authentication.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, information security is increasingly crucial given the urgency of protecting learners' personal data, academic records and other sensitive information. In a broader context, information security management policies and practices in the education environment must be carefully optimised to provide not only adequate, but also holistic protection against potential security threats (Kitsios et al, 2023). Given the dynamics of technological development and cyber intelligence, it is imperative that information security policies are proactive and aligned with the latest developments, to ensure the integrity, confidentiality and availability of information that forms the backbone of the learning process and data management in educational settings.…”
Section: Introductionmentioning
confidence: 99%