Adopting ISO/IEC 27005:2011-based risk treatment plan to prevent patients data theft
The concern raised in late 2017 regarding 46.2 million mobile device subscriber's data breach had the Malaysian police started an investigation looking for the source of the leak. Data security is very important to protect the assets or information by providing its confidentiality, integrity, a...
Main Authors: | Hamit, Laura Cassandra (Author), Md. Sarkan, Haslina (Author), Mohd. Azmi, Nurulhuda Firdaus (Author), Mahrin, Mohd. Naz'ri (Author), Chuprat, Suriayati (Author), Yahya, Yazriwati (Author) |
---|---|
Format: | Article |
Language: | English |
Published: |
Insight Society,
2020.
|
Subjects: | |
Online Access: | Get fulltext |
Similar Items
-
Application of product data management at Mimos Bhd
by: Mat Rejab, Mazidah, et al.
Published: (2015) -
Perancangan SMKI Berdasarkan SNI ISO/IEC27001:2013 dan SNI ISO/IEC27005:2013 (Studi Kasus DPTSI-ITS)
by: Furqon Mauladani, et al.
Published: (2018-03-01) -
Fuzzy Delphi method for evaluating HyTEE model (hybrid software change management tool with test effort estimation)
by: Mat Rejab, Mazidah, et al.
Published: (2019) -
GESTÃO DE RISCOS DE SEGURANÇA DA INFORMAÇÃO BASEADA
NA NORMA NBR ISO/IEC 27005 USANDO PADRÕES DE
SEGURANÇA
by: Konzen, Marcos Paulo
Published: (2014) -
A Case Study of Applying ISO 27005 ISRMS to a Military Unit
by: WANG,WEN-CHIEH, et al.
Published: (2016)