MINISTR, Jan and Tomáš PITNER. Process Support of Information Security according to COBIT® 5. In NEMEC, R., CHYTILOVA, L. Proceedings of the 12 th International Conference on Strategic Management and its Support by Information Systems 2017. Ostrava, Czech Republic: VŠB – Technical University of Ostrava, Faculty of Economics, 2017, p. 418-424. ISBN 978-80-248-4046-8.
Other formats:   BibTeX LaTeX RIS
Basic information
Original name Process Support of Information Security according to COBIT® 5
Name in Czech Procesní podpora informační bezpečnosti dle COBIT® 5
Authors MINISTR, Jan (203 Czech Republic) and Tomáš PITNER (203 Czech Republic, guarantor, belonging to the institution).
Edition Ostrava, Czech Republic, Proceedings of the 12 th International Conference on Strategic Management and its Support by Information Systems 2017, p. 418-424, 7 pp. 2017.
Publisher VŠB – Technical University of Ostrava, Faculty of Economics
Other information
Original language English
Type of outcome Proceedings paper
Field of Study 10201 Computer sciences, information science, bioinformatics
Country of publisher Czech Republic
Confidentiality degree is not subject to a state or trade secret
Publication form storage medium (CD, DVD, flash disk)
RIV identification code RIV/00216224:14330/17:00097576
Organization unit Faculty of Informatics
ISBN 978-80-248-4046-8
ISSN 2570-5776
UT WoS 000417344100047
Keywords in English Information security; Information security management system; methodology; framework; stakeholder; life cycle
Tags Reviewed
Changed by Changed by: RNDr. Pavel Šmerk, Ph.D., učo 3880. Changed: 18/5/2018 12:07.
Abstract
Today Information security forms the basic property information system. The methodological framework COBIT®5 provides comprehensive support for implementing information security lifecycle of IT in organizations. COBIT® 5 is very comprehensive method and for untrained users quite confusing. The article is therefore initially focused on explaining the basic structure of the methodological framework, which is built on five pillars and related enablers. Furthermore, the article describes the process structure of the methodology and its support for information security. The conclusion discusses the question of applicability of the approach to ensure information security in different types of organizations.
PrintDisplayed: 13/10/2024 11:29