Skip to main content
Erschienen in: Information Systems and e-Business Management 1/2017

01.02.2016 | Original Article

Ranking information security controls by using fuzzy analytic hierarchy process

verfasst von: Hamid Khajouei, Mehdi Kazemi, Seyed Hamed Moosavirad

Erschienen in: Information Systems and e-Business Management | Ausgabe 1/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Information security can be achieved by implementing a set of appropriate controls. However, identifying and selecting the most effective information security controls in organizations have been major challenges for years. Although many studies have been done to address these challenges, there is still lack of research to rank these controls. In this study, a fuzzy Analytic Hierarchy Process was used to prioritize and select effective managerial domains and control objectives in information security controls. In this research, the process of implementing ISO 27001 Information Security in National Iranian Oil Products Distribution Company was selected. According to results, the access control, information systems acquisition, development and maintenance have the highest priorities among the information security controls in managerial domains. On the other hand, the business continuity management and asset management have the lowest priorities among the studied information security controls. Furthermore, it was found that among 39 control objectives, the user access management and third party service delivery management have the highest and lowest priorities, respectively.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
Zurück zum Zitat Alberts Ch, Dorofee A (2002) Managing information security risks: the OCTAVE (SM) approach. Addison-Wesley Professional, Boston Alberts Ch, Dorofee A (2002) Managing information security risks: the OCTAVE (SM) approach. Addison-Wesley Professional, Boston
Zurück zum Zitat Economic Abrar (2008) Europe Union secure organization calls for reform of data protection laws. Abrar economic, financial Abrar, pp 12–13 Economic Abrar (2008) Europe Union secure organization calls for reform of data protection laws. Abrar economic, financial Abrar, pp 12–13
Zurück zum Zitat Goldstein A, Frank U (2015) Components of a multi-perspective modeling method for designing and managing IT security systems. DOI, Inf Syst E-Bus Manag. doi:10.1007/s10257-015-0276-5 Goldstein A, Frank U (2015) Components of a multi-perspective modeling method for designing and managing IT security systems. DOI, Inf Syst E-Bus Manag. doi:10.​1007/​s10257-015-0276-5
Zurück zum Zitat Harmer G (2014) Governance of enterprise IT based on COBIT 5: a management guide. IT Governance Ltd Harmer G (2014) Governance of enterprise IT based on COBIT 5: a management guide. IT Governance Ltd
Zurück zum Zitat Institute of Standards and Industrial Research of Iran (2007) Information technology—security techniques—management of information and communications technology security, part I, concepts and models for information and communications technology security management. Tehran, Iran Institute of Standards and Industrial Research of Iran (2007) Information technology—security techniques—management of information and communications technology security, part I, concepts and models for information and communications technology security management. Tehran, Iran
Zurück zum Zitat International Standard Organization (2005) ISO/IEC17799—information technology-security technics—code of practice for information security management. Geneva International Standard Organization (2005) ISO/IEC17799—information technology-security technics—code of practice for information security management. Geneva
Zurück zum Zitat International Standard Organization (2005) ISO 27001-2005: information technology—security techniques—information security management systems—requirements. Geneva International Standard Organization (2005) ISO 27001-2005: information technology—security techniques—information security management systems—requirements. Geneva
Zurück zum Zitat Killmeyer J (2006) Information security architecture: an integrated approach to security in the organization. Auerbach Publications Killmeyer J (2006) Information security architecture: an integrated approach to security in the organization. Auerbach Publications
Zurück zum Zitat Office of Government Commerce (2009) ITIL V3 foundation handbook. The Stationery Office Office of Government Commerce (2009) ITIL V3 foundation handbook. The Stationery Office
Zurück zum Zitat Otero AR, Otero CE, Qureshi A (2010) A multi-criteria evaluation of information security controls using boolean features. Int J Netw Secur Appl 2(4):34–45. doi:10.5121/ijnsa.2010.2401 Otero AR, Otero CE, Qureshi A (2010) A multi-criteria evaluation of information security controls using boolean features. Int J Netw Secur Appl 2(4):34–45. doi:10.​5121/​ijnsa.​2010.​2401
Zurück zum Zitat Persse JR (2001) Implementing the capability maturity model. Wiley, London Persse JR (2001) Implementing the capability maturity model. Wiley, London
Zurück zum Zitat Saaty T (1988) Mathematical models for decision support. Springer, Berlin Saaty T (1988) Mathematical models for decision support. Springer, Berlin
Zurück zum Zitat Saint-Germain R (2005) Information security management best practice based on ISO/IEC 17799. Inf Manag J 39(4):60–66 Saint-Germain R (2005) Information security management best practice based on ISO/IEC 17799. Inf Manag J 39(4):60–66
Zurück zum Zitat Shuai R, De-jun M, Ling-bo Z (2006) Model of information security evaluation based on gray analytical hierarchy process. J Comput Appl 6:223–236 Shuai R, De-jun M, Ling-bo Z (2006) Model of information security evaluation based on gray analytical hierarchy process. J Comput Appl 6:223–236
Zurück zum Zitat Zhou Y. S, Wang Y. Z (2011) A multi-criteria evaluation method of information security controls. Fourth international joint conference on computational science and optimization. doi:10.1109/CSO.2011.43 Zhou Y. S, Wang Y. Z (2011) A multi-criteria evaluation method of information security controls. Fourth international joint conference on computational science and optimization. doi:10.​1109/​CSO.​2011.​43
Metadaten
Titel
Ranking information security controls by using fuzzy analytic hierarchy process
verfasst von
Hamid Khajouei
Mehdi Kazemi
Seyed Hamed Moosavirad
Publikationsdatum
01.02.2016
Verlag
Springer Berlin Heidelberg
Erschienen in
Information Systems and e-Business Management / Ausgabe 1/2017
Print ISSN: 1617-9846
Elektronische ISSN: 1617-9854
DOI
https://doi.org/10.1007/s10257-016-0306-y

Weitere Artikel der Ausgabe 1/2017

Information Systems and e-Business Management 1/2017 Zur Ausgabe

Premium Partner