完整後設資料紀錄
DC 欄位語言
dc.contributor.authorFarn, KJen_US
dc.contributor.authorLin, SKen_US
dc.contributor.authorFung, ARWen_US
dc.date.accessioned2014-12-08T15:38:27Z-
dc.date.available2014-12-08T15:38:27Z-
dc.date.issued2004-10-01en_US
dc.identifier.issn0920-5489en_US
dc.identifier.urihttp://dx.doi.org/10.1016/j.csi.2004.03.012en_US
dc.identifier.urihttp://hdl.handle.net/11536/26338-
dc.description.abstractThe security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for the three aspects of ISMS-asset, threat, and vulnerability. (C) 2004 Elsevier B.V. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectcertificationen_US
dc.subjectevaluationen_US
dc.subjectframeworken_US
dc.subjectInformation Security Management Systemen_US
dc.subjectNational Information Assurance Certification anden_US
dc.subjectaccreditation processen_US
dc.titleA study on information security management system evaluation - assets, threat and vulnerabilityen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.csi.2004.03.012en_US
dc.identifier.journalCOMPUTER STANDARDS & INTERFACESen_US
dc.citation.volume26en_US
dc.citation.issue6en_US
dc.citation.spage501en_US
dc.citation.epage513en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000223499200002-
dc.citation.woscount9-
顯示於類別:期刊論文


文件中的檔案:

  1. 000223499200002.pdf

若為 zip 檔案,請下載檔案解壓縮後,用瀏覽器開啟資料夾中的 index.html 瀏覽全文。