Sign In
Not register? Register Now!
Essay Available:
You are here: HomeResearch PaperTechnology
3 pages/≈825 words
Research Paper
English (U.S.)
MS Word
Total cost:
$ 21.87

Information Security Standards in the global context (Research Paper Sample)


• provide a comprehensive definition of security standards • make a list of 10 security standards that you can find, make sure you have an international mix • given the variety of classifications of security standards, select one and explain why your chosen classification makes more sense from a ITM perspective • finally, explain why do you think there are so many standars?


Course Title:
Course Instructor:
Date Due:
A security standard is a documented guideline which details security techniques to be followed by organizations in order to minimize security attacks on the information systems, the technologies and the information contained therein. This is aimed at eliminating information security compromise and ensures the availability, integrity and confidentiality of the information systems, the technologies and infrastructures used as well as the information contained in the organization’s information systems. Security standards provide not only the general outlines on enhancing security but also specific techniques for implementing information system security. Security standards prescribe, at a low level, the ways through which these organizations can enforce their security policies and procedures. Some of the most recognized security standards include ISO17799, ISO27002, TCSEC, ITSEC, ITIL, COBIT, Rainbow Series, Common Criteria, BS 25999-2, IETF, GMITS and GASSP among other standards.
The ISO 17799 consists of ten modules each of which is concerned with specific aspects of security. These modules are security policy, security organization, asset classification and control, personnel security, physical and environmental security, communication and operations management, access control, system development and maintenance, business continuity planning and compliance (Idaho National Laboratory, 2005).
The ISO IEC 27002 is considered an improvement of the ISO 17799 and is composed of ten components which are covered from section two to fifteen. These include the management of security policy, corporate security, organizational asset, human resource security, physical and environmental security, communications and operations, information access control, information system security, information security incidents, business continuity and compliance.
The ITIL jigsaw consists of five major components the central of them being managing the system applications. This is supported by the delivering IT services, supporting these IT services, managing the IT infrastructure and underlining these with the business perspective. The main focus here in on delivering and supporting the IT services. (Hoekstra, & Conradie, n.d.)
The CobiT security standard is goal oriented which is underpinned in the key performance and success indicators. This is formulated in four main areas namely, planning and organization, acquisition and implementation delivery and support and monitoring the IT resources and information within the business organization (Hoekstra, & Conradie, n.d.).
The Standard of Good Practice for Information Security is a development by the Information Security Forum. It is business oriented with a bias in information security risks identification and management. It is aimed at complying with the ISO 27001 through defining, implementing, evaluating and enhancing security techniques suited for the organization (Information Security Forum, 2011).
The BS 259...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

Other Topics:

  • Technology Research Paper About Relevance of Electric Cars
    Description: The paper require a detailed review of the existence of electric cars and establishing a position regarding their existence....
    8 pages/≈2200 words| 18 Sources | APA | Technology | Research Paper |
  • Research On Cloud Computing For Business Perspectives
    Description: Organizations have attained an understanding of the importance of utilizing cloud computing in their operations, and thus they have managed to obtain a lot of advantages in their operations...
    5 pages/≈1375 words| 16 Sources | APA | Technology | Research Paper |
  • Lean Manufacturing Using System Dynamics
    Description: Analysis of Technology Effectiveness of Lean Manufacturing Using System Dynamics Research Paper...
    3 pages/≈825 words| APA | Technology | Research Paper |
Need a Custom Essay Written?
First time 15% Discount!