Näytä suppeat kuvailutiedot

dc.contributor.authorNykänen, Riku
dc.contributor.authorKärkkäinen, Tommi
dc.date.accessioned2015-10-28T06:34:07Z
dc.date.available2015-10-28T06:34:07Z
dc.date.issued2014
dc.identifier.citationNykänen, R., & Kärkkäinen, T. (2014). Aligning Two Specifications for Controlling Information Security. <i>International Journal of Cyber Warfare and Terrorism</i>, <i>4</i>(2), 46-62. <a href="https://doi.org/10.4018/ijcwt.2014040104" target="_blank">https://doi.org/10.4018/ijcwt.2014040104</a>
dc.identifier.otherCONVID_24571053
dc.identifier.otherTUTKAID_65344
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/47476
dc.description.abstractAssuring information security is a necessity in modern organizations. Many recommendations for information security management exist, which can be used to define a baseline of information security requirements. ISO/ IEC 27001 prescribes a process for an information security management system, and guidance to implement security controls is provided in ISO/IEC 27002. Finnish National Security Auditing Criteria (KATAKRI) has been developed by the national authorities in Finland as a tool to verify maturity of information security practices. KATAKRI defines both security control objectives and security controls to meet an objective. Here the authors compare and align these two specifications in the process, structural, and operational level, focusing on the security control objectives and the actual controls. Even if both specifications share the same topics on high level, the results reveal the differences in the scope and in the included security controls.
dc.language.isoeng
dc.publisherI G I Global
dc.relation.ispartofseriesInternational Journal of Cyber Warfare and Terrorism
dc.subject.otherinformation security
dc.subject.otherISO/IEC 27001
dc.subject.otherISO/IEC 27002
dc.subject.otherKATAKRI
dc.subject.othersecurity audit criteria
dc.subject.othersecurity cerification
dc.subject.othersecurity controls
dc.subject.othersecurity management
dc.subject.othersecurity specification alignment
dc.titleAligning Two Specifications for Controlling Information Security
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-201503021399
dc.contributor.laitosTietotekniikan laitosfi
dc.contributor.laitosDepartment of Mathematical Information Technologyen
dc.contributor.oppiaineTietotekniikkafi
dc.contributor.oppiaineMathematical Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.date.updated2015-03-02T16:30:20Z
dc.type.coarjournal article
dc.description.reviewstatuspeerReviewed
dc.format.pagerange46-62
dc.relation.issn1947-3435
dc.relation.numberinseries2
dc.relation.volume4
dc.type.versionpublishedVersion
dc.rights.copyright© 2014 IGI Global. Published in this repository with the kind permission of the publisher.
dc.rights.accesslevelopenAccessfi
dc.relation.doi10.4018/ijcwt.2014040104


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot