Dissertation > Excellent graduate degree dissertation topics show

Discussion on Information Security Risk Assessment about ISO27001

Author: ZhangXiaoMing
Tutor: YuanHuaLin
School: Capital University of Economics
Course: Safety Technology and Engineering
Keywords: Information Security Information Security Risk Assessment ISO / IEC 27001 Information security checklist Risk tree
CLC: TP309
Type: Master's thesis
Year: 2007
Downloads: 220
Quote: 4
Read: Download Dissertation


ISO / IEC 27001 as a representative in the international information security management system standard , has been recognized by more and more countries . Currently , the domestic the certification consulting activities on the standard growing number , however , the information security risk assessment as a key step in implementing ISO/IEC27001 certification consulting , the standard does not give a specific operation method , therefore , consulting firms are each approach , there is no single standard . In order to promote the development of domestic consulting industry information security risk assessment , this article assesses the risk of information security risk assessment methodology used in the project has been involved in the pathway , risk identification and risk calculation methods were discussed , and explore the above questions prepared on the basis of the information security risk assessment methodology . The method of the organization 's information security risk assessment is divided into two parts , a part of the organization 's overall security posture assessment , baseline assessment , operation , notably through information security checklist to complete another part of the evaluation of important assets detailed risk analysis , operations rely on risk-based tree analysis method to complete .

Related Dissertations

  1. The Research of Vector CAD Electronic Drawing Protection System,TP391.72
  2. Study on Strategy of Our National Confidential E-government Nets’ Information Security Construction,D630
  3. Study of Human Resource Management Outsourcing,G647
  4. Study on Information Security of C Company,F270.7
  5. Study on Information Management Security and Countermeasures of A Power Supply Company,F426.61
  6. Digital Information Resources System Security Risk Assessment,G353.1
  7. Reliability and Security Study of the Digital Substation System,TM732
  8. Telecom companies Information Security Risk Management Research Project,F626
  9. Network Information Security in the Legal Study,D922.17
  10. The Research and Implement of Security in Password Authentication System,TP393.08
  11. Optical Image Encryption Algorithms Based on Fractional Mellin Transform,TP309.7
  12. Memory Integrality Verify Oriented Cache Design,TP332
  13. Research and Implementation of Information Security Strategy in Electric Enterprises,TP393.08
  14. Intrusion Detection in Mobile Ad Hoc Networks: A Timed Finite State Machines Approach,TN929.5
  15. Design and Implementation of the online bidding system for information security,TP393.08
  16. Research and Design on Asymmetric Encryption and Decryption Algorithm Based on FFTT,TP309.7
  17. Based on the wireless network \,TP311.52
  18. Aplication and Research on the Encryption Lock in Software Protection of Power System,TP309.7
  19. The Development and Application of the Power Transformer Fault Risk Assessment System,TP311.52
  20. The Study on the Enterprise Information Security and Protection Strategies,TP309
  21. China corporate information security program design,TP393.08

CLC: > Industrial Technology > Automation technology,computer technology > Computing technology,computer technology > General issues > Security and confidentiality
© 2012 www.DissertationTopic.Net  Mobile