Académique Documents
Professionnel Documents
Culture Documents
INTRODUCTION
Figure 1. PDCA
implementation [5]
cycle
of
information
security
2.
3.
4.
5.
6.
7.
8.
9.
III
PROPOSAL OF MODEL FOR EVALUATION
OF INFORMATION SECURITY IN NATURE PARKS
Thorough analysis of various systems of information security
audit has lead the authors to work of David Brewer and
Michael Nash from 2010 [14]. These two authors recognize
that ISO 27001 standard requires organizations both to carry
out a risk assessment and select controls and measures
relevant to information security of their systems. Relationship
between these two requirements is often unclear and murky.
5.
6.
7.
8.
MODEL
IN
and
Number
Symbol
Meaning
Number
Ponder
SUM
of
VI CONCLUSION
controls
1.
N/A
2.
analyzed ISMS
3.
4.
1
SUM
Maximumpossiblemark
133
Maximumpossiblemarkcorrectedfornotapplicablecontrols
EstimatedaverageofimplementationofcontrolsofAnnexA
x,xx on a scale
of 1 to 5
665
REFERENCES
[1] Oxford Dictionaries Languages Matter,
http://www.oxforddictionaries.com/definition/english/nationa
l-park (accessed 14th February 2016.)
[2] Philips, A., Harrison, J. International Standards in
Establishing National Parks and Other Protected Areas, The
George Wright Forum, Volume 14, Number 2, 1997.
[3] IUCN, International Union for Conservation of Nature,
http://www.iucn.org/about/work/programmes/gpap_home/gp
ap_quality/gpap_pacategories/gpap_pacategory2/ (accessed
14th February 2016.)
[4] Official gazette of Croatia, NN 8/13
[5] Pelnekar, C. Planning for and implementing ISP 27001,
ISACA Journal, Volume 4, 2011.