INFORMATION SECURITY AND ISO 27001

  • Felipe Souza Pinheiro
  • Waldir Ribeiro Júnior UNISAL

Resumo

This article aims to disseminate a totally contemporary subject matter, and of great interest by companies / organizations; this comes talk about information security and the ISO who understands. This work also seeks to show some settings on the treaty issue, and ISO implementation methodology. ISO 27001 focuses on information security, and comes to establish procedures and structures to be taken by a company to achieve a high level of quality, safety and commitment to its products and services.

Referências

ABNT ISO 27001, 2006. Brazilian Association of Technical Standards. Standard ABNT NBR ISO/IEC 27001: 2006 – Security Information Management System.

ABNT NBR ISO/IEC 27001:2006 “Security Information Management System – Requirements, 2006â€.

ABREU, Leandro F.S.A., 2011, “Information Security in Social Networksâ€, Sao Paulo.

CHESWICK – W. ; Bellovin, S. M; Rubian A.D., “Firewalls e segurança na internet†2ed. RS Bokman. 2005.

DEY, M., 2007, “Information security management – a practical approach In: Africon 2007â€, 8th IEEE Africon Conference. p.1-6.

FENZ, S., Goluch G., Ekelhart A., Riedl B., Weippl E., 2007, “Information Security Fortification by Ontological Mapping of the ISO/IEC 27001 Standard In: PRDC 2007â€, 13th Pacific Rim International Symposium on Dependable Computing, p.381-8.

FONTES, Edison Luiz Gonçalves, 2012, “Policies and Standards for information securityâ€, 1.Ed. Rio de Janeiro: Brasport.

HATCH, Brian; LEE, James; KURTZ, George, “Security against Hackersâ€, SP: Futura, 2003.

KARABACAK, B. Sogukpinar, 2006, “A quantitative method for ISO 17799 gap analysisâ€, Computers & Security, 25(6);413-9.

KOSUTIC, Dejan, February, 8/2011, “27001 Academy-treinamentosâ€. Available in: < http://advisera.com/27001academy/pt-br/blog/2011/02/08/qual-e-o-custo-da-implementacao-da-iso-27001/>.

LINUX, Linus.org. 2008. Available in: .

NETWORK, Faculdade, 2013, “College Magazine of Information Systemsâ€, n.1, PP. 77-86.

NEUBAUER, T., Ekelhart, A., and Fenz, S., 2008, “Interactive Selection of ISO 27001 Controls under Multiple Objectivesâ€, vol. 278, Boston: Springer, pp. 477-491.

MARCIANO, João L. P., 2006, “Information Security - a social approachâ€, Brasília.

McGEE, AR Bastry FA, Chandrashekhar U, Vasireddy SR, Flynn LA, 2007, “Using the bell labs security framework to enhance the ISSO 17799/27001 information security management systemâ€, Bell Labs Technical Journal, 12(3):39-54.

MICROSOFT WINDOWS SERVER, 2003. Version 2003, Microsoft Corporation. 2003, 1 CD-ROM.

RIBAS, Carlos Eduardo, 2010, “Information security management system in health care organizationsâ€, Sao Paulo.

SÊMOLA, Marcos, 2002, “Information Security management: an executive viewâ€, publishing company: Campus Elsevier, 2ª edition, pp. 43-73.

SOUZA, Ranieri Marinho, 2007, “Deployment tools and information security techniques in accordance with ISO 27001 and ISO 17799â€, PUC – Minas.

THOMAZ, Katia P., jan/jun. 2007, “Trusted digital repositories and certificationâ€, Rio de Janeiro, vol. 3, n.1, pp. 59-80.

THOMAZ, Katia P. e SOARES, Antonio José, fev. 2014. “Digital preservation and the reference model Open Archival Information System (OAIS). Data Grama Zeroâ€, v. 5, n. 1. Available in:<http://www.dgz.org.br/fev04/F_I_art.htm>. Accessed in: July 23, 2007.

Publicado
03/02/2016
Seção
Gestão e Qualidade