Abstract
Most organizations are looking to mitigate or avoid different kinds of risks which may affect the confidentiality and integrity of sensitive information. They spend a lot of money to protect their assets from such threats. Organizations highly require information security management to preserve the continuity of their businesses. Several security frameworks have been offered in the literature to protect the confidentiality, integrity, and availability of sensitive data. Thus, this book chapter reviews the importance of information security management frameworks and highlights the differences and similarities between information security management frameworks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
X. Zhang, N. Wuwong, H. Li, X. Zhang, Information security risk management framework for the cloud computing environments, in 2010 10th IEEE international conference on computer and information technology (2010), pp. 1328–1334
H. Al-Aqrabi, R. Hill, P. Lane, H. Aagela, Securing manufacturing intelligence for the industrial internet of things, in Fourth International Congress on Information and Communication Technology (Springer, 2020), pp. 267–282
H. Al-Aqrabi, R. Hill, A secure connectivity model for internet of things analytics service delivery, in 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI) (IEEE, 2018), pp. 9–16
R. Pang, Z. **, S. Ji, X. Luo, T. Wang, On the security risks of {AutoML}, in 31st USENIX Security Symposium (USENIX Security 22) (2022), pp. 3953–3970
D.-M. Chivulescu, Balanced, as all things should be: PSD2 and cybersecurity risks. University of Twente (2021)
W. Chang, P. Chung, Knowledge management in cybercrime investigation–a case study of identifying cybercrime investigation knowledge in Taiwan, in Pacific-Asia Workshop on Intelligence and Security Informatics (2014), pp. 8–17
T.R. Reshmi, Information security breaches due to ransomware attacks-a systematic literature review. Int. J. Inf. Manag. Data Insights 1(2), 100013 (2021)
T. Cooper, J. Collman, Managing information security and privacy in healthcare data mining. Med. Informatics (2005), pp. 95–137
G. Stoneburner, A. Goguen, A. Feringa, Risk management guide for information technology systems. Nist Spec. Publ. 800(30), 800–830 (2002)
J. Brenner, ISO 27001 risk management and compliance. Risk Manag. 54(1), 24–29 (2007)
J.A. Silva Pineda, PolÃticas para la seguridad de la información en el aplicativo de la ClÃnica de Occidente según norma (ISo 27001/Iso 27002/Iso 27003). Universidad Piloto de Colombia (2014)
M. Sadikin, R.Y. Harwikarya, L. Mitaliska, Combining ITAF and ISO 27004 to Perform IS Audit in Higher Education Institution, in International Conference on Recent Innovations in Computer Science and Information Technology (ICRICSIT-2015), New York, USA (2015), pp. 5–6
V. Agrawal, A framework for the information classification in ISO 27005 standard, in 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud) (2017), pp. 264–269
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Al-Dhaqm, A., Othman, S.H., Yafooz, W.M.S., Ali, A. (2023). Review of Information Security Management Frameworks. In: Yafooz, W.M.S., Al-Aqrabi, H., Al-Dhaqm, A., Emara, A. (eds) Kids Cybersecurity Using Computational Intelligence Techniques. Studies in Computational Intelligence, vol 1080. Springer, Cham. https://doi.org/10.1007/978-3-031-21199-7_5
Download citation
DOI: https://doi.org/10.1007/978-3-031-21199-7_5
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-21198-0
Online ISBN: 978-3-031-21199-7
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)