dc.contributor.author | Nykänen, Riku | |
dc.contributor.author | Kelo, Tomi | |
dc.contributor.author | Kärkkäinen, Tommi | |
dc.date.accessioned | 2024-04-17T08:41:52Z | |
dc.date.available | 2024-04-17T08:41:52Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Nykänen, R., Kelo, T., & Kärkkäinen, T. (2023). Analysis of the Next Evolution of Security Audit Criteria. <i>Journal of Information Warfare</i>, <i>22</i>(4), 25-39. <a href="https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria" target="_blank">https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria</a> | |
dc.identifier.other | CONVID_207657282 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/94343 | |
dc.description.abstract | Security assessments are performed for multiple reasons, including compliance with the information security regulation. Amongst other objectives, regulatory requirements are created to increase the resilience of national infrastructure and protect against information and cybersecurity threats. When the regulatory requirements are revised, the security audit criteria also need to be updated and validated. This was also the case with the Julkri, criteria developed for the conformance assessments of the renewed Finnish information security regulation. In this article, a comparative evaluation based on Design Science Research is performed to determine whether the new Julkri criteria improve existing criteria and control catalogues. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | ArmisteadTEC | |
dc.relation.ispartofseries | Journal of Information Warfare | |
dc.relation.uri | https://www.jinfowar.com/journal/volume-22-issue-4/analysis-next-evolution-security-audit-criteria | |
dc.rights | In Copyright | |
dc.subject.other | Security Audit Criteria | |
dc.subject.other | Security Assessment | |
dc.subject.other | Information Security Controls | |
dc.subject.other | Design Science Research | |
dc.title | Analysis of the Next Evolution of Security Audit Criteria | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202404172962 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.format.pagerange | 25-39 | |
dc.relation.issn | 1445-3312 | |
dc.relation.numberinseries | 4 | |
dc.relation.volume | 22 | |
dc.type.version | acceptedVersion | |
dc.rights.copyright | © 2024 the Authors | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | tietoturva | |
dc.subject.yso | tietoturvapolitiikka | |
dc.subject.yso | kehittämistutkimus | |
dc.subject.yso | auditointi | |
dc.subject.yso | standardit | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p5479 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p25795 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26823 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p7985 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p4513 | |
dc.rights.url | http://rightsstatements.org/page/InC/1.0/?language=en | |
dc.type.okm | A1 | |