CFP last date
20 January 2025
Reseach Article

Standardization of all Information Security Management Systems

by Afshin Rezakhani, AbdolMajid Hajebi, Nasibe Mohammadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 18 - Number 8
Year of Publication: 2011
Authors: Afshin Rezakhani, AbdolMajid Hajebi, Nasibe Mohammadi
10.5120/2307-2592

Afshin Rezakhani, AbdolMajid Hajebi, Nasibe Mohammadi . Standardization of all Information Security Management Systems. International Journal of Computer Applications. 18, 8 ( March 2011), 4-8. DOI=10.5120/2307-2592

@article{ 10.5120/2307-2592,
author = { Afshin Rezakhani, AbdolMajid Hajebi, Nasibe Mohammadi },
title = { Standardization of all Information Security Management Systems },
journal = { International Journal of Computer Applications },
issue_date = { March 2011 },
volume = { 18 },
number = { 8 },
month = { March },
year = { 2011 },
issn = { 0975-8887 },
pages = { 4-8 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume18/number8/2307-2592/ },
doi = { 10.5120/2307-2592 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:05:42.416060+05:30
%A Afshin Rezakhani
%A AbdolMajid Hajebi
%A Nasibe Mohammadi
%T Standardization of all Information Security Management Systems
%J International Journal of Computer Applications
%@ 0975-8887
%V 18
%N 8
%P 4-8
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information security relates to the protection of Information Technology assets against the risks of loss, misuse, disclosure or damage. Information security management system (ISMS) is controls that organizations need to implement to ensure that it is sensibly managing these risks. In the other hands, all IDSs/IPSs do many efforts to control networks attacks. In this article we propose creating standard platform for all information security management systems. Also we suggest placing standard knowledgebase in the new added section in ISMSs to create standard security implementation. With this, all information security management systems will be more powerful and decreasing/increasing new plans in organizations will be done easier.

References
  1. The Definition of Information Security on Wikipedia, last visited in December 2010.
  2. Bon van, J. (2004). IT-Service management: een introductie op basis van ITIL. Van Haren Publishing
  3. Cazemier, Jacques A.; Overbeek, Paul L.; Peters, Louk M. (2000). Security Management, Stationery Office.
  4. Tse, D. (2005). Security in Modern Business: security assessment model for information security Practices. Hong Kong: University of Hong Kong.
  5. A Study of Effect of Information Security Management System [ISMS] Certification on Organization Performance, IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.3, March 2010.
  6. http://www.iso.org/iso/, last visited in December 2010.
  7. S. Axelsson, “Intrusion Detection Systems: A Taxonomy and Survey,” Technical Report No 99-15, Dept. of Computer Engineering, Chalmers University of Technology, Sweden, March 2000.
  8. Leila Rikhtechi, Afshin Rezakhani Roozbahani, “Creating a Standard Platform for All Intrusion Detection/Prevention Systems”, ICCMS, 2010.
  9. URL:http://www.networkworld.com/news/2008/090908-japan-attacktraffic.html, last visited in December 2009.
  10. Shun, J. Malki, H.A., "Network Intrusion Detection System Using Neural Networks", ICNC 08, Jinan , November 2008.
  11. S.A.Onashoga, Adebayo D.Akinde and A. S.Sodiya, “A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems” Department of Computer Science, University of Agriculture,Abeokuta, Nigeria, Volume 6, 2009.
  12. Cryptography and Network Security: Principles and Practice By William Stallings, 2010.
  13. Afshin Rezakhani Roozbahani, L.Rikhtechi and N.mohammadi, "Converting Network Attacks to Standard Semantic Web Form in Cloud Computing Infrastructure", International Journal of Computer Applications (0975 – 8887) Volume 3 – No.4, June 2010
  14. K.MuthuManickam, "A Security Model for Mobile Agent in Grid Environment", International Journal of Computer Applications (0975 – 8887) Volume 2 – No.2, May 2010.
  15. COBIT control management Rsam: Automated COBIT governance platform.
  16. http://www.ism3.com/page9.phps, last visited in December 2010.
  17. S.A.Onashoga, Adebayo D.Akinde and A. S.Sodiya, “A Strategic Review of Existing Mobile Agent-Based Intrusion Detection Systems” Department of Computer Science, University of Agriculture,Abeokuta, Nigeria, Volume 6, 2009.
  18. Kaspersky Security Bulletin 2009. Statistics, 2009.
Index Terms

Computer Science
Information Sciences

Keywords

Information Technology ISMSs IDS/IPS