Digital Library
Search: "[ keyword: Information security management system ]" (9)
A Study on the Method of Checking the Level of Information Security Management Using Security Maturity Model
이상규,
김인석,
Vol. 28, No. 6, pp. 1585-1594,
Nov.
2018
10.13089/JKIISC.2018.28.6.1585
Keywords: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
10.13089/JKIISC.2018.28.6.1585
Keywords: information security, Information security management system, ISMS, Security Maturity Model, C2M2, information security, Information security management system, ISMS, Security Maturity Model, C2M2
Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level)
Keun-dug Park,
Heung-youl Youm,
Vol. 26, No. 6, pp. 1605-1618,
Dec.
2016
10.13089/JKIISC.2016.26.6.1605
Keywords: Electronic Financial Infrastructure, information security, ISMS(Information Security Management System), SECU-STAR(SECUriTy Assessment for Readiness), CNIVAM(Critical Network Infrastructure Vulnerability Analysis.Measurement)
10.13089/JKIISC.2016.26.6.1605
Keywords: Electronic Financial Infrastructure, information security, ISMS(Information Security Management System), SECU-STAR(SECUriTy Assessment for Readiness), CNIVAM(Critical Network Infrastructure Vulnerability Analysis.Measurement)
Improvement of the Certification Model for Enhancing Information Security Management Efficiency for the Financial Sector
Eun Oh,
Tae-Sung Kim,
Tae-Hee Cho,
Vol. 26, No. 2, pp. 541-550,
Apr.
2016
10.13089/JKIISC.2016.26.2.541
Keywords: Information security management system, Financial Information Security, Finanacial Information Security Management System
10.13089/JKIISC.2016.26.2.541
Keywords: Information security management system, Financial Information Security, Finanacial Information Security Management System
A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System
Choong-Cheang Lee,
Jin Kim,
Chung-Hun Lee,
Vol. 24, No. 5, pp. 919-930,
Oct.
2014
10.13089/JKIISC.2014.24.5.919
Keywords: Information security management system, Information Security Priorities, Information Security Importance, Information Security Investment
10.13089/JKIISC.2014.24.5.919
Keywords: Information security management system, Information Security Priorities, Information Security Importance, Information Security Investment
Information Security Management System Evaluation Criteria with availability for Korean Smart Grid
Ok Heo,
Seungjoo Kim,
Vol. 24, No. 3, pp. 547-560,
Jun.
2014
10.13089/JKIISC.2014.24.3.547
Keywords: Information Security Management System(ISMS), information assurance, Smart Grid, Critical Infrastructure
10.13089/JKIISC.2014.24.3.547
Keywords: Information Security Management System(ISMS), information assurance, Smart Grid, Critical Infrastructure
A Security Evaluation Criteria for Korean Cloud Computing Service
Kichul Kim,
Ok Heo,
Seungjoo Kim,
Vol. 23, No. 2, pp. 251-266,
Apr.
2013
10.13089/JKIISC.2013.23.2.251
Keywords: Information Security Management System(ISMS), information assurance, Security Evaluation, Cloud computing
10.13089/JKIISC.2013.23.2.251
Keywords: Information Security Management System(ISMS), information assurance, Security Evaluation, Cloud computing
Evaluation Criteria for Korean Smart Grid based on K-ISMS
Kichul Kim,
Seungjoo Kim,
Vol. 22, No. 6, pp. 1375-1392,
Dec.
2012
10.13089/JKIISC.2012.22.6.1375
Keywords: Information security management system, Security Control, Security Evaluation, Smart Grid, Critical Infrastructure
10.13089/JKIISC.2012.22.6.1375
Keywords: Information security management system, Security Control, Security Evaluation, Smart Grid, Critical Infrastructure
National Institution's Information Security Management on the Smart phone use environment
Ji-Sook Kim,
Jong-In Lim,
Vol. 20, No. 6, pp. 83-96,
Dec.
2010
10.13089/JKIISC.2010.20.6.83
Keywords: Smart Phone, mobile office, mobile security threats, mobile-government information security management system
10.13089/JKIISC.2010.20.6.83
Keywords: Smart Phone, mobile office, mobile security threats, mobile-government information security management system
Comparison of The ISMS Difference for Private and Public Sector
Ji-Sook Kim,
Soo-Yeun Lee,
Jong-In Lim,
Vol. 20, No. 2, pp. 117-130,
Apr.
2010
10.13089/JKIISC.2010.20.2.117
Keywords: information security, Information security management system, Information security management condition evaluation
10.13089/JKIISC.2010.20.2.117
Keywords: information security, Information security management system, Information security management condition evaluation