Show Less
Restricted access

Frontiers in ICT

Towards Web 3.0

Edited By Zoran Levnajic

Life without the World Wide Web has become unthinkable, much like life without electricity or water supply. We rely on the web to check public transport schedules, buy a ticket for a concert or exchange photos with friends. However, many everyday tasks cannot be accomplished by the computer itself, since the websites are designed to be read by people, not machines. In addition, the online information is often unstructured and poorly organized, leaving the user with tedious work of searching and filtering. This book takes us to the frontiers of the emerging Web 3.0 or Semantic Web – a new generation of web aimed at bridging this gap and making the web experience accessible and easy. The Semantic Web is a vision of online information that can be readily interpreted and analyzed by machines, adapting it to user’s needs and abilities.
Show Summary Details
Restricted access

ISO 27007 Information System Audit and Comparison with ISO 27006

Extract

Information security is becoming one of the most important business issues organizations are facing today. Concerns about an individual’s privacy, sensitive personal data, credibility and integrity of business data, etc., require the implementation of new laws and regulations that will enable organizations to properly address the security of their own data and data they were entrusted with to manage. The number of specific standards and methodologies that define policies and procedures regulating and controlling the information security domain is increasing. The article focuses on the fact that also standards from the ISO/IEC1 27k family, in particular ISO/IEC 27007:2011 and ISO/IEC 27006:2007, can facilitate the preparation for and delivery of the audit of information security management systems (ISMS) so as to maintain the auditing principles. On the other hand, ISACA2 also upgraded ISACA COBIT3 5 integrated approach with a professional guide COBIT 5 for Information Security, which, like the standard ISO/IEC 27007:2011, is another approach for information security audit and the ISMS.

Keywords ISO/IEC 27007:20011, ISO/IEC 27006:2007, COBIT 5, Information ­Security Audit

Information security is becoming one of the most important business issues that organizations are facing today. Concerns about an individual’s privacy, sensitive personal data, protection of sensitive business data, credibility and integrity of business data, etc. require the implementation of new laws and regulations that will enable organizations to properly address the security of ← 103 | 104 → their own data and data they were entrusted with to manage (Axelord et al...

You are not authenticated to view the full text of this chapter or article.

This site requires a subscription or purchase to access the full text of books or journals.

Do you have any questions? Contact us.

Or login to access all content.