Full metadata record
DC FieldValueLanguage
dc.contributor.authorFarn, KJen_US
dc.contributor.authorLin, SKen_US
dc.contributor.authorFung, ARWen_US
dc.date.accessioned2014-12-08T15:38:27Z-
dc.date.available2014-12-08T15:38:27Z-
dc.date.issued2004-10-01en_US
dc.identifier.issn0920-5489en_US
dc.identifier.urihttp://dx.doi.org/10.1016/j.csi.2004.03.012en_US
dc.identifier.urihttp://hdl.handle.net/11536/26338-
dc.description.abstractThe security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for the three aspects of ISMS-asset, threat, and vulnerability. (C) 2004 Elsevier B.V. All rights reserved.en_US
dc.language.isoen_USen_US
dc.subjectcertificationen_US
dc.subjectevaluationen_US
dc.subjectframeworken_US
dc.subjectInformation Security Management Systemen_US
dc.subjectNational Information Assurance Certification anden_US
dc.subjectaccreditation processen_US
dc.titleA study on information security management system evaluation - assets, threat and vulnerabilityen_US
dc.typeArticleen_US
dc.identifier.doi10.1016/j.csi.2004.03.012en_US
dc.identifier.journalCOMPUTER STANDARDS & INTERFACESen_US
dc.citation.volume26en_US
dc.citation.issue6en_US
dc.citation.spage501en_US
dc.citation.epage513en_US
dc.contributor.department資訊管理與財務金融系 註:原資管所+財金所zh_TW
dc.contributor.departmentDepartment of Information Management and Financeen_US
dc.identifier.wosnumberWOS:000223499200002-
dc.citation.woscount9-
Appears in Collections:Articles


Files in This Item:

  1. 000223499200002.pdf

If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.