Identifying the role of Information Systems to implement Information Security System

  • Authors

    • Dr. Siew Poh Phung
    • Assoc. Prof. Dr. Valliappan Raju
    • Tuan Haji Zanial
    https://doi.org/10.14419/ijet.v8i1.10.28387
  • Information Security System, Implementation
  • Given that data forms a crucial resource in the contemporary world, especially in situations such as those involving handling crime, guidelines or benchmarks have evolved to support the security of the data. This paper presents different forms of data security principles and culminates into an examination of crucial data security measures that are worth embracing. Specific data security guidelines that the paper presents include COBIT, ITIL, PCIDSS, BS 7799, AND ISO27001. The study’s central objective is to highlight a state of standardization and position that the respective standards exhibit, as well as different countries’ appropriations and the ease of use of these guidelines. 

     

     

  • References

    1. [1] Alan Calder and Setve Watkins. IT Governance – A Manager’s Guide to Data Security and ISO 27001 and ISO 27002

      [2] Abdulkader Alfantookh. An Approach for the Assessment of The Application of ISO 27001 Essential Information Security Controls.

      [3] Computer Sciences, King Saud University. 2009

      [4] Basie von Solms. 2005. Information Security Governance: COBIT or ISO 17799 or both? Computer&Security Journal. Elsevier.Science Direct Basie von Solms. 2005. Information Security Governance – Compliance Management vs Operational Management. Computer & Security Journal. Elsevier, Science Direct Basie von Solms & Rossouw von Solms. 2004. The 10 deadly sins of Information Security Management. Computer & Security 23(2004) 371-­†376. Elsevier Science Ltd.

      [5] Heru Susanto & Fahad bin Muhaya. Multimedia Information Security Architecture. @ IEEE. 2010.

      [6] Heru Susanto, Mohammad Nabil Almunawar & Yong Chee Tuan.

      [7] I-­â€SolFramework View on ISO 27001. Information Security Management System: Refinement Integrated Solution’s Six Domains. Journal of Computer, Asian Transaction. July 2011.

      [8] ISO History and Definition. www.iso.org

      [9] IT Governance Institute. COBIT 4.1 Excerpts. 2007. Rolling Meadows,

      [10] IT Governance Institute. Mapping of ITIL v3 with COBIT 4.1. 2008.

      [11] Rolling Meadows, IL 60008 USA

      [12] The Government of the Hong Kong. An Overview of Information Security Standards. 2008. Hongkong.

      [13] Overview on COBIT. http://www.benchmarklearning.com/COMMUNITIES/ITIL/cobit.aspx.

  • Downloads

  • How to Cite

    Siew Poh Phung, D., Valliappan Raju, A. P. D., & Haji Zanial, T. (2019). Identifying the role of Information Systems to implement Information Security System. International Journal of Engineering & Technology, 8(1.10), 186-191. https://doi.org/10.14419/ijet.v8i1.10.28387