Reference Hub1
An Information Security Model for Implementing the New ISO 27001

An Information Security Model for Implementing the New ISO 27001

Margareth Stoll
ISBN13: 9781522571131|ISBN10: 1522571132|EISBN13: 9781522571148
DOI: 10.4018/978-1-5225-7113-1.ch013
Cite Chapter Cite Chapter

MLA

Stoll, Margareth. "An Information Security Model for Implementing the New ISO 27001." Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, IGI Global, 2019, pp. 219-242. https://doi.org/10.4018/978-1-5225-7113-1.ch013

APA

Stoll, M. (2019). An Information Security Model for Implementing the New ISO 27001. In I. Management Association (Ed.), Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications (pp. 219-242). IGI Global. https://doi.org/10.4018/978-1-5225-7113-1.ch013

Chicago

Stoll, Margareth. "An Information Security Model for Implementing the New ISO 27001." In Censorship, Surveillance, and Privacy: Concepts, Methodologies, Tools, and Applications, edited by Information Resources Management Association, 219-242. Hershey, PA: IGI Global, 2019. https://doi.org/10.4018/978-1-5225-7113-1.ch013

Export Reference

Mendeley
Favorite

Abstract

The importance of data privacy, information availability, and integrity is increasingly recognized. Sharpened legal requirements and increasing data leakages have further promoted data privacy. In order to implement the different requirements in an effective, efficient, and sustainable way, the authors integrate different governance frameworks to their holistic information security and data privacy model. More than 1.5 million organizations worldwide are implementing a standard-based management system. In order to promote the integration of different standards, the International Standard Organization (ISO) released a common structure. ISO/IEC 27001 for information security management was changed accordingly in October 2013. The holistic model fulfills all requirements of the new version. Its implementation in several organizations and the study's results are described. In that way data privacy and security are part of all strategic, tactical, and operational business processes, promote corporate governance and living security, as well as the fulfillment of all standard requirements.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.