Näytä suppeat kuvailutiedot

dc.contributor.authorNykänen, Riku
dc.contributor.authorKelo, Tomi
dc.contributor.authorKärkkäinen, Tommi
dc.date.accessioned2024-04-17T08:41:52Z
dc.date.available2024-04-17T08:41:52Z
dc.date.issued2023
dc.identifier.citationNykänen, R., Kelo, T., & Kärkkäinen, T. (2023). Analysis of the Next Evolution of Security Audit Criteria. <i>Journal of Information Warfare</i>, <i>22</i>(4), 25-39. <a href="https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria" target="_blank">https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria</a>
dc.identifier.otherCONVID_207657282
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/94343
dc.description.abstractSecurity assessments are performed for multiple reasons, including compliance with the information security regulation. Amongst other objectives, regulatory requirements are created to increase the resilience of national infrastructure and protect against information and cybersecurity threats. When the regulatory requirements are revised, the security audit criteria also need to be updated and validated. This was also the case with the Julkri, criteria developed for the conformance assessments of the renewed Finnish information security regulation. In this article, a comparative evaluation based on Design Science Research is performed to determine whether the new Julkri criteria improve existing criteria and control catalogues.en
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherArmisteadTEC
dc.relation.ispartofseriesJournal of Information Warfare
dc.relation.urihttps://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria
dc.rightsIn Copyright
dc.subject.otherSecurity Audit Criteria
dc.subject.otherSecurity Assessment
dc.subject.otherInformation Security Controls
dc.subject.otherDesign Science Research
dc.titleAnalysis of the Next Evolution of Security Audit Criteria
dc.typearticle
dc.identifier.urnURN:NBN:fi:jyu-202404172962
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.type.urihttp://purl.org/eprint/type/JournalArticle
dc.type.coarhttp://purl.org/coar/resource_type/c_2df8fbb1
dc.description.reviewstatuspeerReviewed
dc.format.pagerange25-39
dc.relation.issn1445-3312
dc.relation.numberinseries4
dc.relation.volume22
dc.type.versionacceptedVersion
dc.rights.copyright© 2024 the Authors
dc.rights.accesslevelopenAccessfi
dc.subject.ysotietoturva
dc.subject.ysotietoturvapolitiikka
dc.subject.ysokehittämistutkimus
dc.subject.ysoauditointi
dc.subject.ysostandardit
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p5479
jyx.subject.urihttp://www.yso.fi/onto/yso/p25795
jyx.subject.urihttp://www.yso.fi/onto/yso/p26823
jyx.subject.urihttp://www.yso.fi/onto/yso/p7985
jyx.subject.urihttp://www.yso.fi/onto/yso/p4513
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA1


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright