1 |
ISO/IEC 27002:2005 Information Technology - Security Techniques - Code of practice for information security management, ISO/IEC, Switzerland, 2005.
|
2 |
Date Breach QuickView: An Executive's Guide to Data Breach Trends in 2012, Risk Based Security, Inc., February 2013.
|
3 |
H. Susanto, M. N. Almunawar and Y. C. Tuan, "Information Security Management System Standards: A Comparative Study of the Big Five", International Journal of Electrical & Computer Sciences, 11(5), pp. 23-29, October 2011.
|
4 |
조희준, IT 거버넌스 프레임워크 코빗 - COBIT 4.1을 중심으로, 인포더북스, 2010.
|
5 |
R. Sheikhpour and N. Modiri, "An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls", International Journal of Security and Its Applications, 6(2), pp. 13-28, April 2012.
|
6 |
T. Mataracioglu and S. Ozkan, "Governing Information Security in Conjuction with COBIT and ISO 27001", Computing Research Repository, 2011, http://arxiv.org/abs/1108.2150
|
7 |
COBIT 4.1, IT Governance Institute, 2007, www.isaca.org
|
8 |
ISO/IEC 27001:2005 Information Technology - Security Techniques - Information security management systems - Requirements, ISO/IEC, Switzerland, 2005.
|
9 |
Aligning CobiT(R) 4.1, ITIL(R) V3 and ISO/IEC 27002 for Business Benefit, IT Governance Institute, 2008.
|
10 |
COBIT(R) 5 for Information Security, ISACA, 2012.
|
11 |
B. von Solms, "Information Security governance: COBIT or ISO 17799 or both?", Computers & Security, 24(2), pp. 99-104, March 2005.
DOI
|
12 |
ISO/IEC FDIS 27001 Information technology - Security techniques - Information security management systems - Requirements, ISO/IEC, 2013, http://www.iso.org/
|