Skip to main content

A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 27001:2013 Using an Ontology

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Electrical Engineering ((LNEE,volume 424))

Abstract

This paper presents a system design using the design and linking semantic technology of ontologies by mapping the structure base and finding identical meanings of each text. The Wu and Palmer method and WordNet database were used for this purpose. The accuracy of the results of the concept are measured by using Recall, Precision, and F-Measure. Then, the proposed designed can be used to developed tools to qualify the security system for communications security domain under the standards of information security management for ISO 27001:2013. However, the cost of certification to organisations to meet international standards is considerable. Our intention was to demonstrate the ontology-based concept for organisations to be able to reduce their certification costs by waiving the requirement for an external consultant to evaluate their standards and policies.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. An Introduction to ISO 27001 (ISO27001). http://www.27000.org/iso-27001.htm. Accessed October 2016

  2. Kanno, Y.: Information Security Measures Benchmark (ISM-Benchmark). IT Security Center, Information-Technology Promotion Agency, Japan (2009)

    Google Scholar 

  3. Sharma, N.K., Dash, P.K.: Effectiveness of ISO 27001, as an information security management system: an analytical study of financial aspects. Far East J. Psychol. Bus. 9(3), 42–55 (2012)

    Google Scholar 

  4. Uschold, M., Gruninger, M.: Ontologies principles methods and applications. Knowl. Eng. Rev. 11(2), 93–155 (1996)

    Article  Google Scholar 

  5. World Wide Web Consortium: OWL Web Ontology Language (2004). http://www.w3.org/TR/owl-features/

  6. Miller, G.A., Beckwith, R., Fellbaum, C., Gross, D., Miller, K.: Introduction to WordNet: an on-line lexical database. Int. J. Lexicogr. 3, 235–244 (1990)

    Article  Google Scholar 

  7. Pérez, J., Arenas, M., Gutierrez, C.: Semantics and complexity of SPARQL. Universidad de Talca, Chile (2009)

    Google Scholar 

  8. Lovrić, Z.: Model of simplified implementation of PCI DSS by using ISO 27001 standard. In: Central European Conference on Information and Intelligent Systems, 19–21 September 2012

    Google Scholar 

  9. Shrivastava, A.K.: ISO27001 compliance via artificial neural network. In: 13th IEEE International Symposium on Pacific Rim Dependable Computing (2007)

    Google Scholar 

  10. Fenz, S., Weippl, E.: Ontology based IT-security planning. In: Secure Business, Austria (2006)

    Google Scholar 

  11. Fenz, S., Goluch, G., Ekelhart, A., Riedl, B., Weippl, E.: Information security fortification by ontological mapping of the ISO/IEC 27001 standard. In: 13th IEEE International Symposium on Pacific Rim Dependable Computing (2007)

    Google Scholar 

  12. Fenz, S.: Ontology-based generation of IT-security metrics. In: SAC 2010, Sierre, Switzerland, 22–26 March 2010

    Google Scholar 

  13. Liu, X., Cao, L., Dai, W.: Overview of ontology mapping and approach. In: 2011 4th IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT), pp. 592–595, 28–30 October 2011

    Google Scholar 

  14. Wu, Z., Palmer, M.: Verb semantic and lexical selection. In: Proceeding of 32nd Annual Meeting of the Association for Computational Linguistics (ACL), Las Cruces, US, pp. 133–138 (1994)

    Google Scholar 

  15. Corley, C., Mihalcea, R.: Measuring the semantic similarity of texts. Department of Computer Science, University of North Texas (2005)

    Google Scholar 

  16. Fernando, S., Stevenson, M.: A semantic similarity approach to paraphrase detection. Department of Computer Science, University of Sheffield, Sheffield, UK (2008)

    Google Scholar 

Download references

Acknowledgement

Many thanks to Mr. Roy Morien and Mr. Kevin Roebl of the Naresuan University Language Center for his editing assistance and advice on English expression in this document.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Janjira Payakpate .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer Nature Singapore Pte Ltd.

About this paper

Cite this paper

Sirisom, P., Payakpate, J., Wongthai, W. (2017). A System Design for the Measurement and Evaluation of the Communications Security Domain in ISO 27001:2013 Using an Ontology. In: Kim, K., Joukov, N. (eds) Information Science and Applications 2017. ICISA 2017. Lecture Notes in Electrical Engineering, vol 424. Springer, Singapore. https://doi.org/10.1007/978-981-10-4154-9_30

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-4154-9_30

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-4153-2

  • Online ISBN: 978-981-10-4154-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics