In this paper we perform a pragmatic evaluation of the ISO
27001 metamodel [14] which was already semantically
evaluated [15]. As the figure shows, we use two additional
elements to do so: the Bugtraq vulnerability archive, a publicly
accessible database of software vulnerabilities, and an
information security process model to capture the activities of
information security managers and reflect on the applicability
of our metamodel.
III. RELATED WORK
A. Information Security Standards
One of the major challenges in managing information
security are incomplete information about the risks the
information systems are facing as well as available controls to
address them [20]. As such, planning models, checklists and
guidelines have been and still are popular. As each
organization identifies the threats to their information systems
and determines suitable countermeasures, a set of best-practice
procedures and techniques emerges. In an attempt to
standardize efforts in information security, best-practice
frameworks and standards have been developed (e.g. ISO
17799, 2700x, NIST). Due to their origin, these vary in scope
and purpose. Furthermore, they vary in depth as well as in the
level of detail and granularity.
In this paper we perform a pragmatic evaluation of the ISO27001 metamodel [14] which was already semanticallyevaluated [15]. As the figure shows, we use two additionalelements to do so: the Bugtraq vulnerability archive, a publiclyaccessible database of software vulnerabilities, and aninformation security process model to capture the activities ofinformation security managers and reflect on the applicabilityof our metamodel.III. RELATED WORKA. Information Security StandardsOne of the major challenges in managing informationsecurity are incomplete information about the risks theinformation systems are facing as well as available controls toaddress them [20]. As such, planning models, checklists andguidelines have been and still are popular. As eachorganization identifies the threats to their information systemsand determines suitable countermeasures, a set of best-practiceprocedures and techniques emerges. In an attempt tostandardize efforts in information security, best-practiceframeworks and standards have been developed (e.g. ISO17799, 2700x, NIST). Due to their origin, these vary in scopeand purpose. Furthermore, they vary in depth as well as in thelevel of detail and granularity.
การแปล กรุณารอสักครู่..
