Author : Mr. Mohd Tajammul 1
Date of Publication :20th February 2018
Abstract: Data is a very critical element of any corporation in the modern age of information. Its protection is the main concern of an organization. Current scenario does not indicate that data is fully protected and also there does not exist any single mechanism which can make data cent percent secure. Security breaches that are leakage of sensitive information leverage a bad effect on the market of cloud computing. It produces a barrier before organizations to adopt cloud computing. In this paper, the effect of security standards on the data protection and also on the market of cloud computing has been uncovered. Finally, a comparative study of ten security standards namely PRINCE2, COSO, ISO27001, BS7799, OPM3, PCI-DSS, CMMI, SOA, ITIL and COBIT has been discussed.
Reference :
-
- Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101116. https://doi.org/10.1016/j.ins.2015.09.004
- Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364368. https://doi.org/10.1016/j.ijinfomgt.2013.11.002
- Sajid, M. (2013). Cloud Computing : Issues & Challenges.
- Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 111. https:// doi. org/ 10.1016 /j.jnca. 2010. 07. 006
- Susanto, H., Almunawar, M., & Tuan, Y. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical Computer Sciences IJECS-IJENS, 11(5), 2329.
- Hayne, C., & Free, C. (2014). Hybridized professional groups and institutional work: COSO and the rise of enterprise risk management. Accounting, Organizations and Society, 39(5), 309330. https://doi. org/ 10. 1016/ j.aos. 2014.05.002
- Aljazzaf, Z. M., Capretz, M. A. M., & Perry, M. (2016). Trust-based Service-Oriented Architecture. Journal of King Saud University - Computer and Information Sciences, 28(4), 470480. https://doi. org/ 10.1016/ j.jksuci. 2015. 12.003
- Townsend, E. (2008). The 25 year History of Service Oriented Architecture. Wallshein, C. C., & Loerch, A. G. (2015). The Journal of Systems and Software Software cost estimating for CMMI Level 5 developers. The Journal of Systems & Software, 105, 7278. http://https: //doi .org/ 10.1016 /j.jss. 2015. 03. 069
- http://blog.deurainfosec.com
- http://www.techrepublic.com/blog/it-security
- https://www.itgovernance.co.uk/iso27001
- https://www.iso.org/isoiec-27001-informationsecurity.html
- https://www.wikipedia.org/opm3
- Abdulkader, Alfantookh. (2009) An Approach for the Assessment of The Application of ISO 27001 Essential Information Security Controls. Computer Sciences, King Saud University.
- Theobald, J. (n.d.). The Road to BS7799 Certification and using ISO17799 as an Information Security Framework.
- https://www.itgovernance.co.uk/iso27001-benefits
- https://www.slideshare.net/ifourabhishek/ draw backso fiso 27001
- Huang, S. J., & Han, W. M. (2006). Selection priority of process areas based on CMMI continuous representation. Information and Management, 43(3), 297307. https://doi.org/10.1016/j.im.2005.08.003
- https://www.coursehero.com/file/pfudb5/Disadvantag es-of-using-COBIT-to-establish-an-IT-management-andgovernance/