Interactive selection of ISO 27001 controls under multiple objectives

27Citations
Citations of this article
52Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

IT security incidents pose a major threat to the efficient execution of corporate strategies. Although, information security standards provide a holistic approach to mitigate these threats and legal acts demand their implementation, companies often refrain from the implementation of information security standards, especially due to high costs and the lack of evidence for a positive cost/benefit ratio. This paper presents a new approach that supports decision makers in interactively defining the optimal set of security controls according to ISO 27001. Therefore, it uses input data from a security ontology that allows the standardized integration of rules which are necessary to model potential countermeasure combinations based on the ISO 27001 standard controls. The approach was implemented into a tool and tested by means of a case study. It not only supports decision makers in defining the controls needed for certification but also provides them with information regarding the efficiency of the chosen controls with regard to multiple definable objectives. © 2008 Springer Science+Business Media, LLC.

Cite

CITATION STYLE

APA

Neubauer, T., Ekelhart, A., & Fenz, S. (2008). Interactive selection of ISO 27001 controls under multiple objectives. In IFIP International Federation for Information Processing (Vol. 278, pp. 477–491). Springer New York. https://doi.org/10.1007/978-0-387-09699-5_31

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free