Browse > Article

정보보호 요소의 통합에 관한 선행 연구: COBIT 4.1과 ISO/IEC 27002:2005의 매핑을 중심으로  

Kim, Jeong Hyun ((주)씨에이에스, ISACA 한국협회 보안부문)
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 ISO/IEC 27002:2005 Information Technology - Security Techniques - Code of practice for information security management, ISO/IEC, Switzerland, 2005.
2 Date Breach QuickView: An Executive's Guide to Data Breach Trends in 2012, Risk Based Security, Inc., February 2013.
3 H. Susanto, M. N. Almunawar and Y. C. Tuan, "Information Security Management System Standards: A Comparative Study of the Big Five", International Journal of Electrical & Computer Sciences, 11(5), pp. 23-29, October 2011.
4 조희준, IT 거버넌스 프레임워크 코빗 - COBIT 4.1을 중심으로, 인포더북스, 2010.
5 R. Sheikhpour and N. Modiri, "An Approach to Map COBIT Processes to ISO/IEC 27001 Information Security Management Controls", International Journal of Security and Its Applications, 6(2), pp. 13-28, April 2012.
6 T. Mataracioglu and S. Ozkan, "Governing Information Security in Conjuction with COBIT and ISO 27001", Computing Research Repository, 2011, http://arxiv.org/abs/1108.2150
7 COBIT 4.1, IT Governance Institute, 2007, www.isaca.org
8 ISO/IEC 27001:2005 Information Technology - Security Techniques - Information security management systems - Requirements, ISO/IEC, Switzerland, 2005.
9 Aligning CobiT(R) 4.1, ITIL(R) V3 and ISO/IEC 27002 for Business Benefit, IT Governance Institute, 2008.
10 COBIT(R) 5 for Information Security, ISACA, 2012.
11 B. von Solms, "Information Security governance: COBIT or ISO 17799 or both?", Computers & Security, 24(2), pp. 99-104, March 2005.   DOI
12 ISO/IEC FDIS 27001 Information technology - Security techniques - Information security management systems - Requirements, ISO/IEC, 2013, http://www.iso.org/