Review of Information Security Management Frameworks

  • Chapter
  • First Online:
Kids Cybersecurity Using Computational Intelligence Techniques

Part of the book series: Studies in Computational Intelligence ((SCI,volume 1080))

Abstract

Most organizations are looking to mitigate or avoid different kinds of risks which may affect the confidentiality and integrity of sensitive information. They spend a lot of money to protect their assets from such threats. Organizations highly require information security management to preserve the continuity of their businesses. Several security frameworks have been offered in the literature to protect the confidentiality, integrity, and availability of sensitive data. Thus, this book chapter reviews the importance of information security management frameworks and highlights the differences and similarities between information security management frameworks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
EUR 29.95
Price includes VAT (Germany)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
EUR 139.09
Price includes VAT (Germany)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
EUR 181.89
Price includes VAT (Germany)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info
Hardcover Book
EUR 181.89
Price includes VAT (Germany)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. X. Zhang, N. Wuwong, H. Li, X. Zhang, Information security risk management framework for the cloud computing environments, in 2010 10th IEEE international conference on computer and information technology (2010), pp. 1328–1334

    Google Scholar 

  2. H. Al-Aqrabi, R. Hill, P. Lane, H. Aagela, Securing manufacturing intelligence for the industrial internet of things, in Fourth International Congress on Information and Communication Technology (Springer, 2020), pp. 267–282

    Google Scholar 

  3. H. Al-Aqrabi, R. Hill, A secure connectivity model for internet of things analytics service delivery, in 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (IEEE, 2018), pp. 9–16

    Google Scholar 

  4. R. Pang, Z. **, S. Ji, X. Luo, T. Wang, On the security risks of {AutoML}, in 31st USENIX Security Symposium (USENIX Security 22) (2022), pp. 3953–3970

    Google Scholar 

  5. D.-M. Chivulescu, Balanced, as all things should be: PSD2 and cybersecurity risks. University of Twente (2021)

    Google Scholar 

  6. W. Chang, P. Chung, Knowledge management in cybercrime investigation–a case study of identifying cybercrime investigation knowledge in Taiwan, in Pacific-Asia Workshop on Intelligence and Security Informatics (2014), pp. 8–17

    Google Scholar 

  7. T.R. Reshmi, Information security breaches due to ransomware attacks-a systematic literature review. Int. J. Inf. Manag. Data Insights 1(2), 100013 (2021)

    Google Scholar 

  8. T. Cooper, J. Collman, Managing information security and privacy in healthcare data mining. Med. Informatics (2005), pp. 95–137

    Google Scholar 

  9. G. Stoneburner, A. Goguen, A. Feringa, Risk management guide for information technology systems. Nist Spec. Publ. 800(30), 800–830 (2002)

    Google Scholar 

  10. J. Brenner, ISO 27001 risk management and compliance. Risk Manag. 54(1), 24–29 (2007)

    Google Scholar 

  11. J.A. Silva Pineda, Políticas para la seguridad de la información en el aplicativo de la Clínica de Occidente según norma (ISo 27001/Iso 27002/Iso 27003). Universidad Piloto de Colombia (2014)

    Google Scholar 

  12. M. Sadikin, R.Y. Harwikarya, L. Mitaliska, Combining ITAF and ISO 27004 to Perform IS Audit in Higher Education Institution, in International Conference on Recent Innovations in Computer Science and Information Technology (ICRICSIT-2015), New York, USA (2015), pp. 5–6

    Google Scholar 

  13. V. Agrawal, A framework for the information classification in ISO 27005 standard, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (2017), pp. 264–269

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arafat Al-Dhaqm .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Al-Dhaqm, A., Othman, S.H., Yafooz, W.M.S., Ali, A. (2023). Review of Information Security Management Frameworks. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_5

Download citation

Publish with us

Policies and ethics

Navigation