Abstract
This paper discusses the practical implementation of the Agile Security Development (ASD framework and presents a case study that reviews the process of building an information security management system utilizing the framework. The case study reveals the action steps for a small and medium-sized organization to utilize the method. The ASD framework and its output is fully ISO/IEC17799 compliant but takes the organization’s actual management systems into account, so that ISO/IEC 17799 certification is not necessarily the ultimate target if the organization so chooses. The ASD framework supports auditing against the organization’s own baseline, which might not be compliant with existing standards and industry-defined best practices. Process improvement is achieved here through verifying the company’s ISMS so that it fulfills the requirements the company has set by doing a risk analysis to identify weak spots within the system.
| Original language | English |
|---|---|
| Title of host publication | IAEA Technical Meeting on Cyber Security of Nuclear Power Plant Instrumentation, Control, and Information Systems |
| Publisher | International Atomic Energy Agency IAEA |
| Publication status | Published - 2006 |
| MoE publication type | D3 Professional conference proceedings |
| Event | IAEA Technical Meeting on Cyber Security of Nuclear Power Plant Instrumentation, Control, and Information Systems - Idaho Falls, United States Duration: 17 Oct 2006 → 20 Oct 2006 |
Conference
| Conference | IAEA Technical Meeting on Cyber Security of Nuclear Power Plant Instrumentation, Control, and Information Systems |
|---|---|
| Country/Territory | United States |
| City | Idaho Falls |
| Period | 17/10/06 → 20/10/06 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 7 Affordable and Clean Energy
-
SDG 9 Industry, Innovation, and Infrastructure
-
SDG 12 Responsible Consumption and Production
Fingerprint
Dive into the research topics of 'Practical implementation of ISO 17799 compliant information security management system using novel ASD method'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver