Skip to main content

A Study on Comparative Analysis of the Information Security Management Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6019))

Abstract

Due to the advance of mobile network, E-commerce, Open Networks, and Internet Banking, Information Security Management System (ISMS) is used to manage information of their customer and themselves by a government or a business organization . The best known ISMSs are BS7799/ISO17799, Common Criteria, which are international standard. And some nations use their own ISMS, e.g., DITSCAP of USA, IT Baseline Protection Manual of Germany, ISMS of Japan. The paper explains the existed ISMSs and presents a comparative analysis on difference among ISMSs. The discussion deals with different aspects of types of the ISMSs: analysis on the present condition of the ISMSs, certification structure, and certification evaluation process. The study contribute so that a government or a business organization is able to refer to improve information security level of the organizations. The case study can also provide a business organization with an easy method for building ISMS.

This research was supported by the Ministry of Knowledge Economy, Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Advancement) (IITA-2009-(C1090-0902-0016)).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. International Standard ISO/IEC 15408, Common Methodology for Information Technology Security Evaluation,Version 3.1, 2006.10

    Google Scholar 

  2. International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Envluation, Part1,Version 3.1, 2006.10

    Google Scholar 

  3. International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Envluation, Part2,Version 3.1, 2006.10

    Google Scholar 

  4. International Standard ISO/IEC 15408, Common Criteria for Information Technology Security Envluation, Part2,Version 3.1, 2006.10

    Google Scholar 

  5. Japan Information processing development corporation, JIS Q 27001 (ISO/IEC 27001:2005) Information security management sytem conformity assessment scheme (2006)

    Google Scholar 

  6. JIPDEC, http://www.isms.jipdec.jp/en/index.html

  7. BSI, BS7799 Part 2: Code of Practice for Information Security Management, British Standards Institute (1999)

    Google Scholar 

  8. ISO, International Standards ISO/IEC 27001, Information technology Security techniques-Information security management systems-requirements (2005)

    Google Scholar 

  9. http://www.iso27001security.com/html/27000.html

  10. IT Baseline Protection Manual (2004)

    Google Scholar 

  11. IT Baseline protection Manual Layer model, http://www.bsi.bund.de/english/gshb/manual/schichtenmodell.htm

  12. DoD 5810.1-M: DITSCAP Applicatio Manual (2001)

    Google Scholar 

  13. Valletta, A.M.: DoD Instruction (1997)

    Google Scholar 

  14. DoD Information Assurance, http://www.ati4it.com/DOD

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Jo, H., Kim, S., Won, D. (2010). A Study on Comparative Analysis of the Information Security Management Systems. In: Taniar, D., Gervasi, O., Murgante, B., Pardede, E., Apduhan, B.O. (eds) Computational Science and Its Applications – ICCSA 2010. ICCSA 2010. Lecture Notes in Computer Science, vol 6019. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12189-0_44

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12189-0_44

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12188-3

  • Online ISBN: 978-3-642-12189-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics