_._order_210453327(23).doc - Running head INFORMATION...

  • No School
  • AA 1
  • 103

This preview shows page 1 - 5 out of 103 pages.

Running head: INFORMATION SECURITY STANDARDS i The Benefits of Adopting Information Security Standards within Oil and Gas Companies Name Institution
Image of page 1

Subscribe to view the full document.

INFORMATION SECURITY STANDARDS ii Abstract This research study focuses on the topic of information technology auditing security standards. It is based on the application of these security standards in oil and gas companies operating within the Emirate of Abu Dhabi in the United Arab Emirates. To achieve the research objectives, the study uses four companies that operate in the target industry namely ADNOC and its sister Companies, Total Oil Company, Dolphin Energy, and Mubadala Petroleum Company as case studies for its findings. Primarily, a review of credible publications on the topic of study was used to support some of the study’s key assertions. This review (of literature) has been complemented by a detailed survey study, which included 303 respondents from the targeted companies. Primary data in the study was collected through questionnaires and analyzed through statistical methods. Some of the subtopics covered in the study included the application of IT security auditing standards in organizations, procedures of conducting an IT audit, types of IT security auditing standards, benefits of adopting these standards, and the reasons for organizations not adopting the standards. The main finding of the study is that IT security auditing standards have exponential benefits to the organizations and their employees. As such, the study concludes that all organizations should adopt at least one IT security auditing standards to ensure the safety and security of their enterprise information systems. Key Words : Enterprise, Breaches, Threats, Hacking, Software, Infrastructure, Computer, and Systems. Acknowledgement
Image of page 2
INFORMATION SECURITY STANDARDS iii Table of Contents Abstract ....................................................................................................................................................... ii Acknowledgement ...................................................................................................................................... iii
Image of page 3

Subscribe to view the full document.

INFORMATION SECURITY STANDARDS iv List of Tables ............................................................................................................................................. vii List of Figures ........................................................................................................................................... viii Glossary of Terms ........................................................................................................................................ x List of Acronym .......................................................................................................................................... xi 1. CHAPTER ONE: INTRODUCTION .................................................................................................. 1 1.1. Background of the Study .............................................................................................................. 1 1.2. Research Rationale ...................................................................................................................... 3 1.3. Problem Statement ...................................................................................................................... 3 1.4. Scope of the Research Study ........................................................................................................ 5 1.5. Objectives of the Study ................................................................................................................ 5 1.6. Research Questions ..................................................................................................................... 5 1.6.1. Main Research Questions ..................................................................................................... 5 1.6.2. Supporting Research Questions ........................................................................................... 6 1.7. Assumptions of the Study ............................................................................................................ 6 1.8. Limitations of the Study ............................................................................................................... 6 1.9. Significance of the Study .............................................................................................................. 7 2. CHAPTER TWO: LITERATURE REVIEW ....................................................................................... 9 2.1. The History of Information Security ........................................................................................... 10 2.2. Application of IT Security Standards in an Information Security Management System .............. 12 2.3. IT Security Audits against IT Security Standards ......................................................................... 14 2.3.1. Procedures of an IT Audit .................................................................................................. 15 2.4. Types of IT Audits ....................................................................................................................... 17 2.5. The Benefits of Adopting Information Security Auditing Standards ........................................... 20 2.5.1. Cost Saving ........................................................................................................................ 21 2.5.2. Enhanced Customer Satisfaction ........................................................................................ 22 2.5.3. Increasing the Company’s Productivity and Improving Its Performance ........................... 23 2.5.4. Enhanced Risk Management .............................................................................................. 24 2.5.5. Enhances Communication and Understanding between Companies Operating Within the Same Industry .................................................................................................................................... 26 2.6. Information Technology Security Standards and Best Practices ................................................. 27 2.6.1. ISO/IEC 27000 Series ........................................................................................................ 29 2.6.2. COBIT ............................................................................................................................... 33
Image of page 4
Image of page 5

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Ask Expert Tutors You can ask 0 bonus questions You can ask 0 questions (0 expire soon) You can ask 0 questions (will expire )
Answers in as fast as 15 minutes