Mapping and Analyzing ISO 27002 with Controls of COBIT 4.1
碩士 === 國立高雄師範大學 === 資訊教育研究所 === 96 === “To understand the effect is to know the causes.” In the application of Information Technology (IT), improving the operations efficiency often brings about security problems. A careless mistake of access priority could cause a loss of hundreds of millions dol...
Main Authors: | Ou Yang, Hui-Hua, 歐陽惠華 |
---|---|
Other Authors: | Chung-Huang Yang |
Format: | Others |
Language: | zh-TW |
Online Access: | http://ndltd.ncl.edu.tw/handle/33783652741897659360 |
Similar Items
-
Mapping and Analyzing ISO 27002 with Controls of COBIT 4.1
by: Ou Yang, Hui-Hua, et al.
Published: (2008) -
Audit Keamanan TI Menggunakan Standar ISO/IEC 27002 dengan COBIT 5
by: Altry David Purba, et al.
Published: (2018-12-01) -
COMBINING ITIL, COBIT AND ISO/IEC 27002 FOR STRUCTURING COMPREHENSIVE INFORMATION TECHNOLOGY FOR MANAGEMENT IN ORGANIZATIONS
by: Maico Gehrmann
Published: (2012-09-01) -
Combining ITIL, COBIT and ISO/IEC 27002 for structuring comprehensive information technology for management in organizations
by: Maico Gehrmann
Published: (2012-09-01) -
Comparative Analysis and Design of Cybersecurity Maturity Assessment Methodology Using NIST CSF, COBIT, ISO/IEC 27002 and PCI DSS
by: Diah Sulistyowati, et al.
Published: (2020-12-01)