International Journal of Management and Applied Science (IJMAS)
.
Follow Us On :
current issues
Volume-10,Issue-1  ( Jan, 2024 )
Past issues
  1. Volume-10,Issue-1  ( Jan, 2024 )
  2. Volume-9,Issue-12  ( Dec, 2023 )
  3. Volume-9,Issue-11  ( Nov, 2023 )
  4. Volume-9,Issue-10  ( Oct, 2023 )
  5. Volume-9,Issue-9  ( Sep, 2023 )
  6. Volume-9,Issue-8  ( Aug, 2023 )
  7. Volume-9,Issue-7  ( Jul, 2023 )
  8. Volume-9,Issue-6  ( Jun, 2023 )
  9. Volume-9,Issue-5  ( May, 2023 )
  10. Volume-9,Issue-4  ( Apr, 2023 )

Statistics report
Apr. 2024
Submitted Papers : 80
Accepted Papers : 10
Rejected Papers : 70
Acc. Perc : 12%
Issue Published : 119
Paper Published : 5064
No. of Authors : 10503
  Journal Paper


Paper Title :
Security Review based on ISO 27000/ ISO 27001/ ISO 27002 Standards: A Case Study Research

Author :Moutasm Tamimi, Abeer Alzahrani, Reham Aljohani, Manal Alshahrani, Boudor Alharbi

Article Citation :Moutasm Tamimi ,Abeer Alzahrani ,Reham Aljohani ,Manal Alshahrani ,Boudor Alharbi , (2019 ) " Security Review based on ISO 27000/ ISO 27001/ ISO 27002 Standards: A Case Study Research " , International Journal of Management and Applied Science (IJMAS) , pp. 120-123, Volume-5,Issue-8

Abstract : Recently, many organizations have higher demands for implementing a secure software system by adopting standards of security management. The ISO 27000 family standards are common for targeting different assets at an organization for developing its security activities. This study aims to target a number of review and audit activities at ISO 27000/ ISO 27001/ ISO 27002 standards by conducting a case study research methodology on an existing web-based software application in order to deal with physical and environmental security resources. The findings of this paper addressed a mismatched terminology an organization with ISO 27000 terminologies, ISO 27001 addressed a security policy for security requirements to the targeted organization, and ISO 27002 intended with reviewing and auditing the existing software source code. The original value of this paper shows that the use of ISO 27000/ISO 27001/ISO 27002 is quite different of developing an existing secure system rather than developing a new build secure system in terms of challenges of reviewing and auditing processes on existing resources. Keywords - Security Standards, ISO/IEC 27000, 27001, and 27002, Security Review, Case Study.

Type : Research paper

Published : Volume-5,Issue-8


DOIONLINE NO - IJMAS-IRAJ-DOIONLINE-16025   View Here

Copyright: © Institute of Research and Journals

| PDF |
Viewed - 64
| Published on 2019-11-11
   
   
IRAJ Other Journals
IJMAS updates
IJMAS -THANK YOU ALL FOR CONTRIBUTING YOUR PAPER TO IJMAS MAY ISSUE. ALL AUTHORS ARE REQUESTED TO GET THEIR HARD COPY NOW.
The Conference World
Facebook

JOURNAL SUPPORTED BY