TITLE

In ISO-lation: Standards Fill Regs Checklist

AUTHOR(S)
Fest, Glen
PUB. DATE
July 2006
SOURCE
Bank Technology News;Jul2006, Vol. 19 Issue 7, p1
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article reflects on ISO (Internal Organization for Standardization) standards on information technology (IT) security management. Kevin Doyle, information security manager, and many security experts state that the ISO 17799 guidelines can serve as a de facto cover for financial institutions' security and controls requirements. Moreover, the possible foregoing of a more expensive audit would be one practical impact for financial institutions.
ACCESSION #
21699317

 

Related Articles

  • Untitled. Power, Chris // Computer Weekly;1/18/2011, Issue 3, p172 

    In this article the author comments on the new U.S. International Organization for standardization (ISO)/IEC 38500:2008 information technology (IT) governance standard and discusses its benefits. As stated, ISO/IEC clarifies IT governance from the top down by describing it as the means of...

  • ISO 27001. Winder, Davey // PC Pro;Feb2015, Issue 244, p108 

    The article offers information on the International Organization for Standardisation (ISO) 27001 standard. Topics discussed include its relevance in the information technology (IT) industry, the significance of the standard in reducing risks in businesses, and its benefits in small businesses in...

  • ISO OUTLINES GUIDELINES. Gossels, Jonathan // Information Security;May2007, Vol. 10 Issue 5, p45 

    The article discusses the International Organization for Organization (ISO) section that provides guidance for information technology (IT) controls for contractors. The underlying principle for Section 8 of the ISO 17799/27002 is that organizations must exercise the same security measures to...

  • MPEG-7 solutions for RICH CONTENT management. Day, Neil // Online;Sep/Oct2001, Vol. 25 Issue 5, p50 

    Focuses on the MPEG-7 standard introduced by the International Standards Organization for managing digital content. Amount of information produced all over the world yearly; Definition of MPEG-7; Benefits of MPEG-7.

  • Financial industry unites to create XML payments standard to cut processing costs. Huber, Nick // Computer Weekly;12/2/2003, p16 

    Global investment banks and financial suppliers have unveiled one of the most ambitious attempts yet to agree on a common technology for the payments industry. They join the Society of Worldwide Interbank Financial Telecommunications (Swift), a global cooperative of 7,000 financial institutions...

  • Biometric Progress.  // Point for Credit Union Research & Advice;7/1/2008, p3 

    The article reports on a standard security framework established by the International Organization for Standardization (ISO) for the use of biometric authentication of individuals in the financial services industry. According to the ISO, the framework introduces types of biometric technologies...

  • Study on a Threat-Countermeasure Model Based on International Standard Information. Caceres, Guillermo Horacio Ramirez; Teshigawara, Yoshimi // Journal of Systemics, Cybernetics & Informatics;2008, Vol. 6 Issue 6, p42 

    Many international standards exist in the field of IT security. This research is based on the ISO/IEC 15408, 15446, 19791, 13335 and 17799 standards. In this paper, we propose a knowledge base comprising a threat countermeasure model based on international standards for identifying and...

  • Common Criteria Related Security Design Patterns--Validation on the Intelligent Sensor Example Designed for Mine Environment. Bialas, Andrzej // Sensors (14248220);2010, Vol. 10 Issue 5, p4456 

    The paper discusses the security issues of intelligent sensors that are able to measure and process data and communicate with other information technology (IT) devices or systems. Such sensors are often used in high risk applications. To improve their robustness, the sensor systems should be...

  • Securitatea informaÅ£iilor: Abordări diferite. Neagu, Silvian // Quality - Access to Success;2008, Vol. 9 Issue 10, p56 

    The implementation approach of information security management systems is sometimes inadequate as resulted from third party audits. Reviews of correct and wrong approaches of Information Security Management Systems, noticed till now, could help managers to gain effective results from ISO 27001...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics