DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES

Luís Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina, Mario Piattini

Abstract

The maturity and security management systems are essential in order to guarantee the continuity and stability of the companies in the current market situation. However, this requires that enterprises know in every moment their security maturity level and to what extend their information security system must evolve. In small and medium-sized enterprises, the application of security standards has an additional problem, which is the fact that they do not have enough resources to carry out an appropriate management. This security management system must have highly reduced costs for its implementation and maintenance in small and medium-sized enterprises (from here on refered to as SMEs) to be feasible. In this paper, we will put forward our proposal of a maturity model for security management in SMEs and we will briefly analyse other models that exist in the market. This approach is being directly applied to real cases, thus obtaining a constant improvement in its application.

References

  1. Aceituno, V. (2005). "Ism3 1.0: Information security management matury model."
  2. Areiza, K. A., A. M. Barrientos, et al. (2005). Hacia un modelo de madurez para la seguridad de la información. IV Congreso Internacional de Auditoría y Seguridad de la Información.
  3. Areiza, K. A., A. M. Barrientos, et al. (2005). Hacia un modelo de madurez para la seguridad de la información. 3er Congreso Iberoamericano de seguridad Informática.
  4. Barrientos, A. M. and K. A. Areiza (2005). Integración de un sistema de gestión de seguridad de la información conun sistema de gestión de calidad. Master's thesis, Universidad EAFIT.
  5. Biever, C. (2005). "Revealed: the true cost of computer crime." Computer Crime Research Center.
  6. COBIT (2000). Cobit Guidelines, Information Security Audit and Control Association.
  7. Corti, M. E., G. Betarte, et al. (2005). Hacia una implementación Exitosa de un SGSI. IV Congreso Internacional de Auditoría y Seguridad de la Información.
  8. CSI (2002). Computer Security Institute, Computer Crime and Security Survey.
  9. Dhillon, G. and J. Backhouse (2000). "Information System Security Management in the New Millennium." Communications of the ACM 43(7): 125-128.
  10. Eloff, J. and M. Eloff (2003). Information Security Management - A New Paradigm. Annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology SAICSIT03.
  11. Garigue, R. and M. Stefaniu (2003). "Information Security Governance Reporting." Information Systems Security sept/oct: 36-40.
  12. Goldfarb, A. (2006). "The medium-term effects of unavailability " Journal Quantitative Marketing and Economics 4(2): 143-171
  13. Hyder, E. B., K. M. Heston, et al. (2004). The eSCM-SP v2: The eSourcing Capability Model For Service Providers (eSCM-SP) v2. Pittsburh, Pennsylvania, USA. 19 May.
  14. Institute, I. G. "COBIT Mapping: Mapping of ISO/IEC 17799:2000 with COBIT." IT Governance Institute, from http://www.itgi.org.
  15. Jimmy Heschl, C., CISM. (2006). "COBIT Mapping: Mapping of ISO/IEC 17799:2005 with COBIT." IT Governance Institute, from http://www.itgi.org.
  16. Kim, S. and I.Choi (2005). Cost-Benefit Análisis of Security Investments: Methodology and Case Study. ICCSA 2005, LNCS 3482.
  17. Lee, J., J. Lee, et al. (2003). A CC-based Security Engineering Process Evaluation Model. Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC).
  18. Lund, M. S., F. d. Braber, et al. (2003). "Proceedings of the Seventh European Conference On Software Maintenance And Reengineering (CSMR'03)." IEEE.
  19. MageritV2 (2005). Metodología de Análisis y Gestión de Riesgos para las Tecnologías de la Información, V2.
  20. Pertier, T. R. (2003). "Preparing for ISO 17799." Security Management Practices jan/feb: 21-28.
  21. Sant-Germain, R. (2005). "Information Security Management Best Practice Based on ISO/IEC 17799." Setting Standars, The information Management JournaL 39(4): 60-62, 64-66.
  22. Siegel, C. A., T. R. Sagalow, et al. (2002). "Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security." Security Management Practices sept/oct: 33-49.
  23. Stephenson, P. (2004). "Forensic Análisis of Risks in Enterprise Systems." Law, Investigation and Ethics sep/oct: 20-21.
  24. Telang, R. and S. Wattal (2005). Impact of Vulnerability Disclosure on Market Value of Software Vendors: An Empirical Analysis. 4h Workshop on Economics and Information Security, Boston.
  25. Von Solms, B. and R. Von Solms (2001). "Incremental Information Security Certification." Computers & Security 20: 308-310.
  26. Walton, J. P. (2002). Developing an Enterprise Information Security Policy. 30th annual ACM SIGUCCS conference on User services.
  27. Wood, C. C. (2000). Researchers Must Disclose All Sponsors And Potential Conflicts. Computer Security Alert, San Francisco, CA, Computer Security Institute.
Download


Paper Citation


in Harvard Style

Enrique Sánchez L., Villafranca D., Fernández-Medina E. and Piattini M. (2007). DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES . In Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007) ISBN 978-989-8111-12-8, pages 355-362. DOI: 10.5220/0002122003550362


in Bibtex Style

@conference{secrypt07,
author={Luís Enrique Sánchez and Daniel Villafranca and Eduardo Fernández-Medina and Mario Piattini},
title={DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES},
booktitle={Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)},
year={2007},
pages={355-362},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002122003550362},
isbn={978-989-8111-12-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2007)
TI - DEVELOPING A MODEL AND A TOOL TO MANAGE THE INFORMATION SECURITY IN SMALL AND MEDIUM ENTERPRISES
SN - 978-989-8111-12-8
AU - Enrique Sánchez L.
AU - Villafranca D.
AU - Fernández-Medina E.
AU - Piattini M.
PY - 2007
SP - 355
EP - 362
DO - 10.5220/0002122003550362