Computer Science & Information Management

Information Security Management Systems
A Novel Framework and Software as a Tool for Compliance with Information Security Standard

Heru Susanto, PhD
Mohammad Nabil Almunawar, PhD

Information Security Management Systems

Published. Available now.
Pub Date: June 2018
Hardback Price: see ordering info
Hard ISBN: 9781771885775
Paperback ISBN: 978-1-77463-652-7
E-Book ISBN: 9781315232355
Pages: 326pp w/ Index
Binding Type: hardbound / ebook / paperback
Notes: 36 color and 45 b/w illustrations

Now Available in Paperback


This new volume, Information Security Management Systems: A Novel Framework and Software as a Tool for Compliance with Information Security Standard, looks at information security management system standards, risk management associated with information security, and information security awareness within an organization. The authors aim to improve the overall ability of organizations to participate, forecast, and actively assess their information security circumstances.

It is important to note that securing and keeping information from parties who do not have authorization to access such information is an extremely important issue. To address this issue, it is essential for an organization to implement an ISMS standard such as ISO 27001 to address the issue comprehensively. The authors of this new volume have constructed a novel security framework (ISF) and subsequently used this framework to develop software called Integrated Solution Modeling (ISM), a semi-automated system that will greatly help organizations comply with ISO 27001 faster and cheaper than other existing methods. In addition, ISM does not only help organizations to assess their information security compliance with ISO 27001, but it can also be used as a monitoring tool, helping organizations monitor the security statuses of their information resources as well as monitor potential threats. ISM is developed to provide solutions to solve obstacles, difficulties, and expected challenges associated with literacy and governance of ISO 27001. It also functions to assess the RISC level of organizations towards compliance with ISO 27001.

The information provide here will act as blueprints for managing information security within business organizations. It will allow users to compare and benchmark their own processes and practices against these results shown and come up with new, critical insights to aid them in information security standard (ISO 27001) adoption.

CONTENTS:
Preface
Chapter 1: Introduction
1.1. Study Overview
1.2. The Scope of the Problem and Motivations
1.3. Research Positioning
1.4. Research Method
1.5. Outcome and Contributions
1.5. Book Structure
1.6. Concluding Remarks

Chapter 2: Literature Review
2.1. Introduction
2.2. Computer Security: Term and Concept
2.3. Information Security: A Part of Computer Security
2.4. Information Security Management System Standard
2.5. Information Security Management System Framework
2.6. Existing Methods and Tools to Aid in Adopting ISO 27001
2.7. Software Development Methodologies and Performance Measurement

Chapter 3: Methodology
3.1. Introduction
3.2. An Overview of Methodology Stages
3.3. Respondents
3.4. Data Collection Method
3.4. Data Categories
3.5. Data Analysis

Chapter 4: Integrated Solution Framework
4.1. Introduction
4.2. The Challenges
4.3. The Motivations
4.4. Existing Frameworks: The Nine State-of-the-art Frameworks (9STAF)
4.5. Overview of ISF
4.6. The Features Comparison
4.7. ISF Components
4.8. The Mathematical Notation
4.9. Computer Algorithm

Chapter 5: Software Development
5.1. Introduction
5.2. ISM Technologies and Front-End Architecture
5.3. The Database
5.4. Software Development Stages
5.5. Release Version
5.6. Testing Stage
5.7. Comparison of ISM with some Existing Tools

Chapter 6: Testing The Software: RISC Investigation and SP/SQ Measurement
6.1. Introduction
6.2. Research Background
6.3. Study in Brief
6.4. The Result

Chapter 7: Conclusions and Recommendations
7.1. The Major Findings
7.2. Recommendations and Future Research Directions
7.3. Concluding Remarks

Index


About the Authors / Editors:
Heru Susanto, PhD
Head and Researcher, Computational Science & IT Governance Research Group, Indonesian Institute of Sciences; Honorary Professor and Visiting Scholar at the Department of Information Management, College of Management and Hospitality, Tunghai Universit

Heru Susanto, PhD, is currently the head and researcher of the Computational Science & IT Governance Research Group at the Indonesian Institute of Sciences. He is also an Honorary Professor and Visiting Scholar at the Department of Information Management, College of Management and Hospitality, Tunghai University, Taichung, Taiwan. Dr. Heru has experience as an IT professional and as web division head at IT Strategic Management at Indomobil Group Corporation. He has worked as the Prince Muqrin Chair for Information Security Technologies at King Saud University in Riyadh, Saudi Arabia. He received a BSc in Computer Science from Bogor Agricultural University, an MBA in Marketing Management from the School of Business and Management Indonesia, an MSc in Information System from King Saud University, and a PhD in Information Security System from the University of Brunei and King Saud University. His research interests are in the areas of information security, it governance, computational sciences, business process re-engineering, and e-marketing.

Mohammad Nabil Almunawar, PhD
Senior Lecturer and Dean, School of Business and Economics, Universiti of Brunei Darussalam (UBD), Brunei Darussalam

Mohammad Nabil Almunawar, PhD, is currently a senior lecturer and the Dean of the School of Business and Economics, Universiti of Brunei Darussalam (UBD), Brunei Darussalam. Dr. Almunawar has published more than 60 papers in refereed journals, book chapters, and presentations at international conferences. He has more than 25 years of teaching experience in the area of computer and information systems. His overall research interests include applications of IT in management, electronic business/commerce, health informatics, information security, and cloud computing. He is also interested in object-oriented technology, databases and multimedia retrieval.

Dr. Almunawar received his bachelor degree in 1983 from Bogor Agricultural University, Indonesia; his master’s degree (MSc in Computer Science) from the Department of Computer Science, University of Western Ontario, London, Canada, in 1991, and a PhD from the University of New South Wales (School of Computer Science and Engineering, UNSW), Australia, in 1998.




Follow us for the latest from Apple Academic Press:
Copyright © 2024 Apple Academic Press Inc. All Rights Reserved.