完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Farn, KJ | en_US |
dc.contributor.author | Lin, SK | en_US |
dc.contributor.author | Fung, ARW | en_US |
dc.date.accessioned | 2014-12-08T15:38:27Z | - |
dc.date.available | 2014-12-08T15:38:27Z | - |
dc.date.issued | 2004-10-01 | en_US |
dc.identifier.issn | 0920-5489 | en_US |
dc.identifier.uri | http://dx.doi.org/10.1016/j.csi.2004.03.012 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/26338 | - |
dc.description.abstract | The security of information system is like a chain. Its strength is affected by the weakest knot. Since we can achieve 100% Information Security Management System (ISMS) security, we must cautiously fulfill the certification and accreditation of information security. In this paper, we analyzed, studied the evaluation knowledge and skills required for auditing the certification procedures for the three aspects of ISMS-asset, threat, and vulnerability. (C) 2004 Elsevier B.V. All rights reserved. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | certification | en_US |
dc.subject | evaluation | en_US |
dc.subject | framework | en_US |
dc.subject | Information Security Management System | en_US |
dc.subject | National Information Assurance Certification and | en_US |
dc.subject | accreditation process | en_US |
dc.title | A study on information security management system evaluation - assets, threat and vulnerability | en_US |
dc.type | Article | en_US |
dc.identifier.doi | 10.1016/j.csi.2004.03.012 | en_US |
dc.identifier.journal | COMPUTER STANDARDS & INTERFACES | en_US |
dc.citation.volume | 26 | en_US |
dc.citation.issue | 6 | en_US |
dc.citation.spage | 501 | en_US |
dc.citation.epage | 513 | en_US |
dc.contributor.department | 資訊管理與財務金融系 註:原資管所+財金所 | zh_TW |
dc.contributor.department | Department of Information Management and Finance | en_US |
dc.identifier.wosnumber | WOS:000223499200002 | - |
dc.citation.woscount | 9 | - |
顯示於類別: | 期刊論文 |