A cyclical evaluation model of information security maturity
暂无分享,去创建一个
Carla Merkle Westphall | Carlos Becker Westphall | Daniel Ricardo dos Santos | Evandro Alencar Rigon
[1] Shon Harris,et al. CISSP All-in-One Exam Guide , 2001 .
[2] Moon-Seog Jun,et al. The Study on the Maturity Measurement Method of Security Management for ITSM , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[3] David Cowan,et al. External pressure for internal information security controls , 2011 .
[4] Alastair Walker,et al. ISO/IEC 15504 measurement applied to COBIT process maturity , 2012 .
[5] J. Breier,et al. New approach in information system security evaluation , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).
[6] Stewart Kowalski,et al. Towards An Information Security Maturity Model for Secure e-Government Services: A Stakeholders View , 2011, HAISA.
[7] S. Woodhouse. An ISMS (Im)-Maturity Capability Model , 2008, 2008 IEEE 8th International Conference on Computer and Information Technology Workshops.
[8] Vladimir Jirasek. Practical application of information security models , 2012, Inf. Secur. Tech. Rep..
[9] Ainin Sulaiman,et al. Information security landscape and maturity level: Case study of Malaysian Public Service (MPS) organizations , 2009, Gov. Inf. Q..