Audit of Information Security Management System
Identifikátory výsledku
Kód výsledku v IS VaVaI
<a href="https://www.isvavai.cz/riv?ss=detail&h=RIV%2F61989592%3A15210%2F12%3A33141647" target="_blank" >RIV/61989592:15210/12:33141647 - isvavai.cz</a>
Výsledek na webu
—
DOI - Digital Object Identifier
—
Alternativní jazyky
Jazyk výsledku
angličtina
Název v původním jazyce
Audit of Information Security Management System
Popis výsledku v původním jazyce
For a more efficient way of management and for the need to prove itself in the more and more demanding market environment, every organization, enterprise or company has to achieve higher competitiveness. This can be achieved by the implementation of modern systems of management. One of those new systems is the Information Security Management System. Then it is necessary to have trained auditors to perform audits. There are various types of audits such as e.g. the audit by the first party (the internal audit), the audit by the second party (the audit of supplier) or the audit by the third part (certification body). Audits are performed in order to assess how well the Information Security Management System will correspond with the standard according to which it is implemented and certificated as a result. Problems of information security management system require comprehensive knowledge. We can see list of standards, which auditor has to know.
Název v anglickém jazyce
Audit of Information Security Management System
Popis výsledku anglicky
For a more efficient way of management and for the need to prove itself in the more and more demanding market environment, every organization, enterprise or company has to achieve higher competitiveness. This can be achieved by the implementation of modern systems of management. One of those new systems is the Information Security Management System. Then it is necessary to have trained auditors to perform audits. There are various types of audits such as e.g. the audit by the first party (the internal audit), the audit by the second party (the audit of supplier) or the audit by the third part (certification body). Audits are performed in order to assess how well the Information Security Management System will correspond with the standard according to which it is implemented and certificated as a result. Problems of information security management system require comprehensive knowledge. We can see list of standards, which auditor has to know.
Klasifikace
Druh
J<sub>x</sub> - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
CEP obor
AE - Řízení, správa a administrativa
OECD FORD obor
—
Návaznosti výsledku
Projekt
—
Návaznosti
I - Institucionalni podpora na dlouhodoby koncepcni rozvoj vyzkumne organizace
Ostatní
Rok uplatnění
2012
Kód důvěrnosti údajů
S - Úplné a pravdivé údaje o projektu nepodléhají ochraně podle zvláštních právních předpisů
Údaje specifické pro druh výsledku
Název periodika
AWER Procedia information technology and computer science
ISSN
2147-5105
e-ISSN
—
Svazek periodika
3
Číslo periodika v rámci svazku
Nov. 2012
Stát vydavatele periodika
ES - Španělské království
Počet stran výsledku
6
Strana od-do
1051-1056
Kód UT WoS článku
—
EID výsledku v databázi Scopus
—