Skip to main content

Assessment Methodology on Maturity Level of ISMS

  • Conference paper
Knowledge-Based Intelligent Information and Engineering Systems (KES 2005)

Abstract

This paper suggests the evaluation methodology for ISMS (information security management systems) considering technical, managerial, and operational aspects of information security. This methodology includes the evaluation indices, process, and maturity model. We also provide the case study to prove its practical values. This methodology could be used effectively to analyze and evaluate the ISMS of various enterprises.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kim, S., Leem, C.S.: Security of the Internet-based Instant Messenger: Risks and Safeguards. Internet Research. Electronic Networking Applications and Policy 15(1), Emerald (2005)

    Google Scholar 

  2. Kim, S., Lee, H.J., Leem, C.S.: Applying the ISO17799 Baseline Controls as a Security Engineering Principle under the Sarbanes-Oxley Act. Lecture Series on Computer Science and Computational Sciences, vol. 1. VSP International Science Publishers (2004)

    Google Scholar 

  3. Kim, S., Leem, C.S.: Implementation of the Security System for Instant Messengers. In: Zhang, J., He, J.-H., Fu, Y. (eds.) CIS 2004. LNCS, vol. 3314, pp. 739–744. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Kim, S., Leem, C.S.: An Information Engineering Methodology for the Security Strategy Planning. In: Laganá, A., Gavrilova, M.L., Kumar, V., Mun, Y., Tan, C.J.K., Gervasi, O. (eds.) ICCSA 2004. LNCS, vol. 3043, pp. 597–607. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  5. Kang, J.B.: Internet Revolution and Internet Security. Triangle press (2001)

    Google Scholar 

  6. Shin, D.J.: Internet Information Security. Dongil Press (2001)

    Google Scholar 

  7. CC Project Team: Common criteria for Information Technology Security Evaluation. Common Criteria Project (1998)

    Google Scholar 

  8. NIST: An Introduction to Computer Security : The NIST Handbook. National Institute of Standards and Technology (1995)

    Google Scholar 

  9. SSE-CMM Project Team: Systems Security Engineering Capability Maturity Model. SEI of CMU (1999)

    Google Scholar 

  10. BSI: BS7799. BSI (1999)

    Google Scholar 

  11. Kim, J.D., Na, K.S.: Measuring of Index of Information Security by Vulnerability Estimation - Information Property Value Weight. In: Information Security and Cryptology (2000)

    Google Scholar 

  12. Barnard, L.: The Evaluation and Certification of Information Security Against BS7799. Information Management & Computer Security 6(2) (1998)

    Google Scholar 

  13. Solms, R.V.: Information Security Management: the Code of Practice for Information Security Management(BS7799). Information Management & Computer Security 6(2) (1998)

    Google Scholar 

  14. NIST: Security Assessment Guide Information Technology Systems. National Institute of Standards and Technology (2001)

    Google Scholar 

  15. Kim, I.J., Leem, C.S.: Development and Implementation of an Integrated Evaluation System for Continuous Maturity of IS Performance. Journal of the Korean Institute of Industrial Engineering 29(1) (2003)

    Google Scholar 

  16. GAO: Executive Guide - Measuring Performance and Demonstrating Results of Information Technology Investments. GAO (1998)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Leem, C.S., Kim, S., Lee, H.J. (2005). Assessment Methodology on Maturity Level of ISMS. In: Khosla, R., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based Intelligent Information and Engineering Systems. KES 2005. Lecture Notes in Computer Science(), vol 3683. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11553939_87

Download citation

  • DOI: https://doi.org/10.1007/11553939_87

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-28896-1

  • Online ISBN: 978-3-540-31990-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics