_..order_210453327(17) (1).doc - Running head INFORMATION...

  • No School
  • AA 1
  • 72

This preview shows page 1 - 10 out of 72 pages.

Running head: INFORMATION SECURITY STANDARDS i The Benefits of Adopting Information Security Standards within Oil and Gas Companies Name Institution
Image of page 1

Subscribe to view the full document.

INFORMATION SECURITY STANDARDS ii Abstract
Image of page 2
INFORMATION SECURITY STANDARDS iii Acknowledgement
Image of page 3

Subscribe to view the full document.

INFORMATION SECURITY STANDARDS iv Table of Contents
Image of page 4
INFORMATION SECURITY STANDARDS v List of Tables Table 1: Summary of ISO certification statistics Table 2: Research Timeframe
Image of page 5

Subscribe to view the full document.

INFORMATION SECURITY STANDARDS vi List of Figures Figure 1: Relationship between Policy, Standard and Procedure Figure 2: Phases/Steps of an IT Audit Process Figure 3: Range Of Potential IT Audit Types within Physical, Administrative and Technical Controls of an ISMS Figure 4: Sub-standards making the ISO/IEC 27000 Figure 5 – ISO 27001 distribution around the world in 2014 Figure 6 - Evolution of ISO/IEC 27001 certificates in UAE Figure 7: education distribution of respondents Figure 8: respondents’ distribution of majors of studies in their education Figure 9: distribution of respondents’ field of work Figure 10: Distribution of respondents who are members of the IT security teams of their organizations
Image of page 6
INFORMATION SECURITY STANDARDS vii Glossary of Terms Cloud computing – the practice of using the network of remote servers, which are located on the Internet to store, manage, process and retrieve data through web-based tools and applications. It is opposed to having IT services in which the server is installed physically on a computer database. E-commerce platform - the electronic platform in which companies (firms) and individuals conduct business buying goods and services through the Internet. Malware – Software that is designed and/or intended to cause damage and/or disable computers and computer systems. Vulnerability - The state of being exposed to the possibility of being attacked; in this case, by computer viruses and/or hackers.
Image of page 7

Subscribe to view the full document.

INFORMATION SECURITY STANDARDS viii List of Acronym ADSIC - Abu Dhabi Systems & Information Center COBIT – Control Objectives for Information and Related Technology DOD - U.S. Department of Defense EIS - Enterprise Information System FIPS - Federal Information Processing Standards FISMA - Federal Information Security Management Act of 2012 IAF - International Accreditation Forum ICT - Information and Communication Technology ISACA - Information Systems Audit and Control Association ISMS - Information Security Management System LAN - Local Area Network NESA - National Electronic Security Authority NIST – National Institute of Standards and Technology NISTIRs - NIST Interagency or Internal Reports PCs - Personal Computers UAE - United Arab Emirates WAN - Wide Area Network
Image of page 8
INFORMATION SECURITY STANDARDS 1 The Benefits of Adopting Information Security Standards within Oil and Gas Companies 1. CHAPTER ONE: INTRODUCTION 1.1. Background of the Study Technology is definitely one of the biggest innovations of the 21 st century. Over time, technology has become an integral part of operations in the modern world. This is evident from
Image of page 9

Subscribe to view the full document.

Image of page 10

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes