Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Information is a fundamental asset within any organization and the protection of this asset, through a process of information security is of equal importance. COBIT and ISO27001 are as reference frameworks for information security... more
Information is a fundamental asset within any organization and the protection of this asset, through a process of information security is of equal importance. COBIT and ISO27001 are as reference frameworks for information security management to help organizations assess their security risks and implement appropriate security controls. One of the most important sections of IT within the COBIT framework is information security management that cover confidentiality, integrity and availability of resources. Since the issues raised in the information security management of COBIT, are the area covered by the ISO/IEC27001 standard, the best option to meet the information security management in COBIT infrastructure, is using of ISO/IEC27001 standard. For coexistence of and complementary use of COBIT and ISO27001, mapping of COBIT processes to ISO/IEC 27001 controls is beneficial. This paper explores the role of information security within COBIT and describes mapping approach of COBIT processes to ISO/IEC27001 controls for information security management.
This paper explores the role of information security management within ITIL service management and how ITIL and ISO/IEC 27001 are aligned and can work together to improve information security management.
Wireless sensor networks are an emerging technology for monitoring physical world. The energy constraint of Wireless sensor networks makes energy saving and Prolonging the network lifetime become the most important goals of various... more
Wireless sensor networks are an emerging technology for monitoring physical world. The energy constraint of Wireless sensor networks makes energy saving and Prolonging the network lifetime become the most important goals of various routing protocols. Clustering is a key technique used to extend the lifetime of a sensor network by reducing energy consumption. Also Putting few heterogeneous nodes in wireless sensor network is an effective way to increase the network lifetime and stability. The energy saving schemes for homogeneous wireless sensor networks do not perform efficiently when applied to heterogeneous wireless sensor networks. Thus, Energy efficient clustering protocols should be designed for the characteristic of heterogeneous wireless sensor networks. This paper surveys different energy efficient clustering protocols for heterogeneous wireless sensor networks and compares these protocols on various points like, location awareness, clustering method, heterogeneity level and clustering Attributes.
Information security plays an important role in protecting the assets of an organization. A number of best practice frameworks exist to help organizations assess their security risks and implement appropriate security controls.... more
Information security plays an important role in protecting the assets of an organization. A number of best practice frameworks exist to help organizations assess their security risks and implement appropriate security controls. Integration of security best practices like ISO/IEC 27001 into service management best practices processes like ITIL enables the organization to lower the overall cost of maintaining acceptable security levels, effectively manage risks and reduce overall risk levels. ITIL provides a framework of best practice guidances for information technology service management. ISO/IEC 27001 is a set of guidelines, which can be used by an organization to design, deploy and maintain information security management system. From an ITIL perspective, most of the security controls identified in ISO/IEC 27001 are already part of service management. This paper describes mapping of ITIL service management processes to controls of ISO/IEC 27001.