원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
초록
영어
Growing information threats have threatened organization to lose information security controls in these days. Many organizations have accepted the various information security management systems does mention necessity of a continuous evaluation process for the executions of information security management in a theoretical aspect. This study suggests a continuous evaluation process for information security management reflecting the real execution of managers and employees in organizations.
목차
Abstract
1. Introduction
2. The Analysis of Information Security Evaluation System
2.1 CyberScope
2.2 CAESARS (Continuous Asset Evaluation, Situational Awareness, and Risk Scoring)
3. A Proposed Continuous Evaluation Processes for Information Security Management
3.1 Step 1 : Development Phase of Continuous Self-Evaluation Process
3.2 Step 2 : Designing Continuous Self-EvaluationProcess
3.3 Step 3 : Design and Establishment of ContinuousSelf-Evaluation Technical Architecture
3.4 Step 4 : Presentation and Report of the Continuous Self-Evaluation Process Report
4. Conclusion
References
1. Introduction
2. The Analysis of Information Security Evaluation System
2.1 CyberScope
2.2 CAESARS (Continuous Asset Evaluation, Situational Awareness, and Risk Scoring)
3. A Proposed Continuous Evaluation Processes for Information Security Management
3.1 Step 1 : Development Phase of Continuous Self-Evaluation Process
3.2 Step 2 : Designing Continuous Self-EvaluationProcess
3.3 Step 3 : Design and Establishment of ContinuousSelf-Evaluation Technical Architecture
3.4 Step 4 : Presentation and Report of the Continuous Self-Evaluation Process Report
4. Conclusion
References
키워드
저자정보
참고문헌
자료제공 : 네이버학술정보