Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Comparative Study of Big Ten Information Security Management System Standards

Author : Mr. Mohd Tajammul 1 Dr. Rafat Praveen 2

Date of Publication :20th February 2018

Abstract: Data is a very critical element of any corporation in the modern age of information. Its protection is the main concern of an organization. Current scenario does not indicate that data is fully protected and also there does not exist any single mechanism which can make data cent percent secure. Security breaches that are leakage of sensitive information leverage a bad effect on the market of cloud computing. It produces a barrier before organizations to adopt cloud computing. In this paper, the effect of security standards on the data protection and also on the market of cloud computing has been uncovered. Finally, a comparative study of ten security standards namely PRINCE2, COSO, ISO27001, BS7799, OPM3, PCI-DSS, CMMI, SOA, ITIL and COBIT has been discussed.

Reference :

    1. Sookhak, M., Gani, A., Khan, M. K., & Buyya, R. (2017). Dynamic remote data auditing for securing big data storage in cloud computing. Information Sciences, 380, 101116. https://doi.org/10.1016/j.ins.2015.09.004
    2. Rasheed, H. (2014). Data and infrastructure security auditing in cloud computing environments. International Journal of Information Management, 34(3), 364368. https://doi.org/10.1016/j.ijinfomgt.2013.11.002
    3. Sajid, M. (2013). Cloud Computing : Issues & Challenges.
    4. Subashini, S., & Kavitha, V. (2011). A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications, 34(1), 111. https:// doi. org/ 10.1016 /j.jnca. 2010. 07. 006
    5. Susanto, H., Almunawar, M., & Tuan, Y. (2011). Information security management system standards: A comparative study of the big five. International Journal of Electrical Computer Sciences IJECS-IJENS, 11(5), 2329.
    6. Hayne, C., & Free, C. (2014). Hybridized professional groups and institutional work: COSO and the rise of enterprise risk management. Accounting, Organizations and Society, 39(5), 309330. https://doi. org/ 10. 1016/ j.aos. 2014.05.002
    7. Aljazzaf, Z. M., Capretz, M. A. M., & Perry, M. (2016). Trust-based Service-Oriented Architecture. Journal of King Saud University - Computer and Information Sciences, 28(4), 470480. https://doi. org/ 10.1016/ j.jksuci. 2015. 12.003
    8. Townsend, E. (2008). The 25 year History of Service Oriented Architecture. Wallshein, C. C., & Loerch, A. G. (2015). The Journal of Systems and Software Software cost estimating for CMMI Level 5 developers. The Journal of Systems & Software, 105, 7278. http://https: //doi .org/ 10.1016 /j.jss. 2015. 03. 069
    9. http://blog.deurainfosec.com
    10. http://www.techrepublic.com/blog/it-security
    11. https://www.itgovernance.co.uk/iso27001
    12. https://www.iso.org/isoiec-27001-informationsecurity.html
    13. https://www.wikipedia.org/opm3
    14.  Abdulkader, Alfantookh. (2009) An Approach for the Assessment of The Application of ISO 27001 Essential Information Security Controls. Computer Sciences, King Saud University.
    15. Theobald, J. (n.d.). The Road to BS7799 Certification and using ISO17799 as an Information Security Framework.
    16. https://www.itgovernance.co.uk/iso27001-benefits
    17. https://www.slideshare.net/ifourabhishek/ draw backso fiso 27001
    18. Huang, S. J., & Han, W. M. (2006). Selection priority of process areas based on CMMI continuous representation. Information and Management, 43(3), 297307. https://doi.org/10.1016/j.im.2005.08.003
    19. https://www.coursehero.com/file/pfudb5/Disadvantag es-of-using-COBIT-to-establish-an-IT-management-andgovernance/

Recent Article