The optimization method of the integrated management system security audit

Nowadays the application of integrated management systems (IMS) attracts the attention of top management from various organizations. However, there is an important problem of running the security audits in IMS and realization of complex checks of different ISO standards in full scale with the essent...

Full description

Bibliographic Details
Main Authors: Ilya Livshitz, Pavel Lontsikh, Sergey Eliseev
Format: Article
Language:English
Published: FRUCT 2017-04-01
Series:Proceedings of the XXth Conference of Open Innovations Association FRUCT
Subjects:
Online Access:https://fruct.org/publications/fruct20/files/Liv2.pdf
_version_ 1818513913062359040
author Ilya Livshitz
Pavel Lontsikh
Sergey Eliseev
author_facet Ilya Livshitz
Pavel Lontsikh
Sergey Eliseev
author_sort Ilya Livshitz
collection DOAJ
description Nowadays the application of integrated management systems (IMS) attracts the attention of top management from various organizations. However, there is an important problem of running the security audits in IMS and realization of complex checks of different ISO standards in full scale with the essential reducing of available resources.
first_indexed 2024-12-11T00:08:07Z
format Article
id doaj.art-cae22a8d85594a9abb6899df797848ff
institution Directory Open Access Journal
issn 2305-7254
2343-0737
language English
last_indexed 2024-12-11T00:08:07Z
publishDate 2017-04-01
publisher FRUCT
record_format Article
series Proceedings of the XXth Conference of Open Innovations Association FRUCT
spelling doaj.art-cae22a8d85594a9abb6899df797848ff2022-12-22T01:28:15ZengFRUCTProceedings of the XXth Conference of Open Innovations Association FRUCT2305-72542343-07372017-04-017762024825310.23919/FRUCT.2017.8071319The optimization method of the integrated management system security auditIlya Livshitz0Pavel Lontsikh1Sergey Eliseev2ITMO University, St. Petersburg, RussiaIrkutsk National Research Technical University, Irkutsk, RussiaIrkutsk National Research Technical University, Irkutsk, RussiaNowadays the application of integrated management systems (IMS) attracts the attention of top management from various organizations. However, there is an important problem of running the security audits in IMS and realization of complex checks of different ISO standards in full scale with the essential reducing of available resources.https://fruct.org/publications/fruct20/files/Liv2.pdf IT-SecurityIntegrated Management SystemsstandardauditIT-security management system
spellingShingle Ilya Livshitz
Pavel Lontsikh
Sergey Eliseev
The optimization method of the integrated management system security audit
Proceedings of the XXth Conference of Open Innovations Association FRUCT
IT-Security
Integrated Management Systems
standard
audit
IT-security management system
title The optimization method of the integrated management system security audit
title_full The optimization method of the integrated management system security audit
title_fullStr The optimization method of the integrated management system security audit
title_full_unstemmed The optimization method of the integrated management system security audit
title_short The optimization method of the integrated management system security audit
title_sort optimization method of the integrated management system security audit
topic IT-Security
Integrated Management Systems
standard
audit
IT-security management system
url https://fruct.org/publications/fruct20/files/Liv2.pdf
work_keys_str_mv AT ilyalivshitz theoptimizationmethodoftheintegratedmanagementsystemsecurityaudit
AT pavellontsikh theoptimizationmethodoftheintegratedmanagementsystemsecurityaudit
AT sergeyeliseev theoptimizationmethodoftheintegratedmanagementsystemsecurityaudit
AT ilyalivshitz optimizationmethodoftheintegratedmanagementsystemsecurityaudit
AT pavellontsikh optimizationmethodoftheintegratedmanagementsystemsecurityaudit
AT sergeyeliseev optimizationmethodoftheintegratedmanagementsystemsecurityaudit