Copyright 2007 INSTICC Institute for Systems and Technologies of Information, Control and Communication All rights reserved
|
|
|
- Gwen Parsons
- 10 years ago
- Views:
Transcription
1
2 Copyright 2007 INSTICC Institute for Systems and Technologies of Information, Control and Communication All rights reserved Edited by Joaquim Filipe, Markus Helfert and Boris Shishkov Printed in Portugal ISBN: Depósito Legal: /07 II
3 GOAL-ORIENTED AUTOMATIC TEST CASE GENERATORS FOR MC/DC COMPLIANCY Emine G. Aydal, Jim Woodcock and Ana Cavalcanti 290 A MODEL-DRIVEN ENGINEERING APPROACH TO REQUIREMENTS ENGINEERING - How These Disciplines May Benefit Each Other Begoña Moros, Cristina Vicente-Chicote and Ambrosio Toval 296 A FORMAL APPROACH FOR THE DEVELOPMENT OF AUTOMATED SYSTEMS Olfa Mosbahi, Leila Jemni and Jacques Jaray 304 SCMM-TOOL - Tool for Computer Automation of the Information Security Management Systems Luís Enrique Sánchez, Daniel Villafranca, Eduardo Fernández-Medina and Mario Piattini 311 A SOFTWARE TOOL FOR REQUIREMENTS SPECIFICATION - On using the STORM Environment to Create SRS Documents Sergiu Dascalu, Eric Fritzinger, Kendra Cooper and Narayan Debnath 319 POSTERS IMPLEMENTING A VALUE-BASED APPROACH TO SOFTWARE PROCESS AND PRODUCT ASSESSMENT Pasi Ojala 329 CLOSING THE BUSINESS-APPLICATION GAP IN SOA - Challenges and Solution Directions Boris Shishkov, Jan L. G. Dietz and Marten van Sinderen 333 PRIORITIZATION OF PROCESSES FOR SOFTWARE PROCESS IMPROVEMENT IN SMALL SOFTWARE ENTERPRISES Francisco J. Pino, Félix Garcia and Mario Piattini 337 SCHEME FOR COMPARING RESULTS OF DIVERSE SOFTWARE VERSIONS Viktor Mashkov and Jaroslav Pokorny 341 TOWARDS A UNIFIED SECURITY/SAFETY FRAMEWORK - A Design Approach to Embedded System Applications Miroslav Sveda and Radimir Vrba 345 THE MISSING LAYER - Deficiencies in Current Rich Client Architectures, and their Remedies Brendan Lawlor and Jeanne Stynes 351 RE-USING EXPERIENCE IN INFORMATION SYSTEMS DEVELOPMENT Paulo Tomé, Ernesto Costa and Luís Amaral 357 TOWARDS A NEW CODE-BASED SOFTWARE DEVELOPMENT CONCEPT ENABLING CODE PATTERNS Klaus Meffert and Ilka Philippow 363 A COMPUTERIZED TUTOR FOR ARCHITECTING SOFTWARE - Supporting the Creative Aspects of Software Development José L. Fernández-Sánchez and Javier Carracedo Pais 367 REQUIREMENTS DEFINITIONS OF REAL-TIME SYSTEM USING THE BEHAVIORAL PATTERNS ANALYSIS (BPA) APPROACHh - The Elevator Control System Assem El-Ansary 371 DETECTING ASPECTUAL BEHAVIOR IN UML INTERACTION DIAGRAMS Amir Abdollahi Foumani and Constantinos Constantinides 378 XVIII
4 SCMM-TOOL Tool for Computer Automation of the Information Security Management Systems Luís Enrique Sánchez, Daniel Villafranca SICAMAN NT. Departamento de I+D, Juan José Rodrigo, 4. Tomelloso, Ciudad Real, Spain {lesanchez, Eduardo Fernández-Medina, Mario Piattini ALARCOS Research Group. TSI Department. UCLM-Soluziona Research and Development Institute University of Castilla-La Mancha, Paseo de la Universidad, Ciudad Real, Spain {Eduardo.FdezMedina, Mario.Piattini}@uclm.es Keywords: Abstract: ISMS, SME, Maturity Model, Risk Analysis. For enterprises to be able to use information technologies and communications with guarantees, it is necessary to have an adequate security management system and tools which allow them to manage it. In addition, security management system must have highly reduced costs for its implementation and maintenance in small and medium-sized enterprises (from here on refered to as SMEs) to be feasible. In this paper, we will show the tool we have developed using our model for the development, implementation and maintenance of a security management system, adapted to the needs and resources of a SME. Furthermore, we will state how this tool lets enterprises with limited resources manage their security system very efficiently. This approach is being directly applied to real cases, thus obtaining a constant improvement in its application. 1 INTRODUCTION Information and processes supporting systems and nets are the most important assets for any organization (Dhillon and Backhouse 2000) and they suppose the main differentiating factor in the evolution of an enterprise. Nowadays, it is very complex for a small or medium-size enterprise to tackle the implementation of a security management system (Pertier 2003; Kim and I.Choi 2005). The tendency in the field of enterprise security is that of gradually migrating their culture towards the creation of a security management system (ISMS), despite the fact that this progression is very slow. Thus, studies such as that of René Sant-Germain (Sant-Germain 2005) estimate that with the current models, by 2009 only 35% of the enterprises in the world which employ more than 2000 people will have implemented an ISMS, and that the figures for SMEs will be much worse. At present, the market demands that enterprises are able to guarantee that technologies for computer assets and information are secure, fast and easy to interact with (Corti et al. 2005). However, in order to fulfill these requirements, the system administrators have discovered two problems with no satisfactory solution: on the one hand, the lack of adequate tools that allow us to face information systems security in a centralized, simple and dimensioned according to the size of enterprises way and on the other hand, the lack of information security guides that let us answer the following questions: Where do I have to search?, What do I have to control? How do I have to control it? Today, this process finishes almost always giving place to the fact that enterprises take the risk of lacking of a security management system due to their inability to implement it. Organizations, both national and international, have made an effort to elaborate a set of regulations and specifications related to security in information and communication technologies to solve the second problem and in spite of the fact that today we can find in the market hundreds of tools oriented to security, none of them is on its own a complete and efficient solution for this kind of systems in the case of SMEs. In this paper, we shall describe a new tool that we have developed from our maturity and security management model oriented to SMEs that tries to 311
5 ICSOFT International Conference on Software and Data Technologies on the project, so that the system will be able to estimate time-milestones in the improvement plan. In Phase III, to include a library with the subprojects that should be worked on to improve the security management system globally. With the help of the action research research method and the feedback directly obtained from our customers, we hope to achieve a continuous improvement in these implementations. ACKNOWLEDGEMENTS This research is part of the following projects: DIMENSIONS (PBC ) and MISTICO (PBC ), both supported by the FEDER and the Consejería de Ciencia y Tecnología de la Junta de Comunidades de Castilla-La Mancha, RETISTRUST (TIN E) granted by the Ministerio de Educación y Ciencia (Spain), and Proyect SCMM-PYME (FIT ) supported by the PROFIT granted by the Ministerio de Industria, Turismo y Comercio). REFERENCES Aceituno, V. (2005). "Ism3 1.0: Information security management matury model." Alberts, C. J. and A. J. Dorofee (2001). OCTAVE Criteria, Version 2.0. Areiza, K. A., A. M. Barrientos, et al. (2005). Hacia un modelo de madurez para la seguridad de la información. IV Congreso Internacional de Auditoría y Seguridad de la Información. Barrientos, A. M. and K. A. Areiza (2005). Integración de un sistema de gestión de seguridad de la información conun sistema de gestión de calidad. Master s thesis, Universidad EAFIT. BS7799 (2002). BS 7799: Information security management systems.. BS25999 (2006). BS Standard for Business Continuity Management. COBIT (2000). Cobit Guidelines, Information Security Audit and Control Association. Corti, M. E., G. Betarte, et al. (2005). Hacia una implementación Exitosa de un SGSI. IV Congreso Internacional de Auditoría y Seguridad de la Información. Dhillon, G. and J. Backhouse (2000). "Information System Security Management in the New Millennium." Communications of the ACM 43(7): Eloff, J. and M. Eloff (2003). Information Security Management - A New Paradigm. Annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology SAICSIT 03. Garigue, R. and M. Stefaniu (2003). "Information Security Governance Reporting." Information Systems Security sept/oct: ISO/IEC17799 (2005). ISO/IEC Information Technology - Security techniques - Code of practice for information security management. Kim, S. and I.Choi (2005). Cost-Benefit Análisis of Security Investments: Methodology and Case Study. ICCSA 2005, LNCS Lee, J., J. Lee, et al. (2003). A CC-based Security Engineering Process Evaluation Model. Proceedings of the 27th Annual International Computer Software and Applications Conference (COMPSAC). MageritV2 (2005). Metodología de Análisis y Gestión de Riesgos para las Tecnologías de la Información, V2. Pertier, T. R. (2003). "Preparing for ISO " Security Management Practices jan/feb: Sant-Germain, R. (2005). "Information Security Management Best Practice Based on ISO/IEC " Setting Standars, The information Management JournaL 39(4): 60-62, Siegel, C. A., T. R. Sagalow, et al. (2002). "Cyber-Risk Management: Technical and Insurance Controls for Enterprise-Level Security." Security Management Practices sept/oct: Swanson, M., A. Wohl, et al. (2002). "Contingency Planning Guide for Information Technology Systems." NIST. UNE71502, A. (2004). UNE 71502: Tecnología de la Información. Especificaciones para los sistemas de gestión de seguridad de la información. Wilson, M. and J. Hash (2003). "Building and Information Technology Security Awareness and Training Program." NIST Special Publication
EVALUATION FRAMEWORK FOR SERVICE CATALOG MATURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS
EVALUATION FRAMEWORK FOR SERVICE CATALOG MATURITY IN INFORMATION TECHNOLOGY ORGANIZATIONS Carlos Moreno Martínez Information Systems Department, Universidad Europea de Madrid Spain Email: [email protected]
Curriculum Reform in Computing in Spain
Curriculum Reform in Computing in Spain Sergio Luján Mora Deparment of Software and Computing Systems Content Introduction Computing Disciplines i Computer Engineering Computer Science Information Systems
Get Instant Access to ebook Iso 27001 2014 PDF at Our Huge Library ISO 27001 2014 PDF. ==> Download: ISO 27001 2014 PDF
ISO 27001 2014 PDF ==> Download: ISO 27001 2014 PDF ISO 27001 2014 PDF - Are you searching for Iso 27001 2014 Books? Now, you will be happy that at this time Iso 27001 2014 PDF is available at our online
Govern IT! Possible ways for R+D+i on Computer and Management Sciences, together
Govern IT! Possible ways for R+D+i on Computer and Management Sciences, together Professor Carlos Juiz Universitat de les Illes Balears UIB, Spain Industrial experience Programmer TUI (1989-90), Systems
Using Scrum to Guide the Execution of Software Process Improvement in Small Organizations
Using Scrum to Guide the Execution of Software Process Improvement in Small Organizations Francisco J. Pino, Oscar Pedreira*, Félix García +, Miguel Rodríguez Luaces*, Mario Piattini + IDIS Research Group
SERENITY Pattern-based Software Development Life-Cycle
SERENITY Pattern-based Software Development Life-Cycle Francisco Sanchez-Cid, Antonio Maña Computer Science Department University of Malaga. Spain {cid, amg}@lcc.uma.es Abstract Most of current methodologies
Prediction of Business Process Model Quality based on Structural Metrics
Prediction of Business Process Model Quality based on Structural Metrics Laura Sánchez-González 1, Félix García 1, Jan Mendling 2, Francisco Ruiz 1, Mario Piattini 1 1 Alarcos Research Group, TSI Department,
Using a Multi-Agent Architecture to Manage Knowledge in the Software Maintenance Process
Using a Multi-Agent Architecture to Manage Knowledge in the Software Maintenance Process Oscar M. Rodríguez 1, Aurora Vizcaíno 2, Ana I. Martínez 1, Mario Piattini 2, Jesús Favela 1 1 CICESE, Computer
Towards an automated testing framework to manage variability using the UML Testing Profile
Automation of Software Test (AST 09) May 18, Vancouver, Canada Towards an automated testing framework to manage variability using the UML Testing Profile Beatriz Pérez Lamancha Software Testing Centre
Definition of a Technological Ecosystem for Scientific Knowledge Management in a PhD Programme
Definition of a Technological Ecosystem for Scientific Knowledge Management in a PhD Programme Alicia García-Holgado Francisco J. García-Peñalvo Mª José Rodríguez-Conde Research Group in InterAction and
"34".!! "#$%&'()!*+!(#!*,!-%!.%/01%$2&%! 5-106&%78!9:!;(#%&1(!-%!3(70&6!<!=67>!9(?@%#!AB$%C!<!D@17!E&12(&?%!
"34".!! "#$%&'()!*+!(#!*,!-%!.%/01%$2&%! 5-106&%78!9:!;(#%&1(!-%!3(70&6!!9(?@%#!AB$%C!
Monalessa Perini Barcellos 1,2, Ana Regina C. da Rocha (advisor) 1, Ricardo de A. Falbo (advisor) 2
An Ontology-based Approach for Software Measurement and Suitability Measurement Repository Evaluation to Apply Statistical Software Process Control in High Maturity Organizations Monalessa Perini Barcellos
Methodologies development and software quality metrics in educational applications
Methodologies development and software quality metrics in educational applications JOAN F. CHIPIA LOBO Maestría en Educación mención Informática y Diseño Instruccional Universidad de Los Andes La Liria,
820324 - GEEN - Energy Management
Coordinating unit: 820 - EUETIB - Barcelona College of Industrial Engineering Teaching unit: 709 - EE - Department of Electrical Engineering Academic year: Degree: 2015 BACHELOR'S DEGREE IN ENERGY ENGINEERING
THE STUDENT S PERSPECTIVE: TEACHING USAGES OF MOODLE AT UNIVERSITY
THE STUDENT S PERSPECTIVE: TEACHING USAGES OF MOODLE AT UNIVERSITY José Sánchez-Santamaría, Francisco Javier Ramos, Pablo Sánchez-Antolín University of Castilla-La Mancha (SPAIN) [email protected],
Adaptación de MoProSoft para la producción de software en instituciones académicas
Adaptación de MoProSoft para la producción de software en instituciones académicas Adaptation of MoProSoft for software production in academic institutions Gabriela Alejandra Martínez Cárdenas Instituto
CURRICULUM VITAE. Name: Ana Maria Iglesias Maqueda. Date: 5/10/2004. Signature:
CURRICULUM VITAE Name: Ana Maria Iglesias Maqueda Date: 5/10/2004 Signature: PERSONAL DATA FAMILY NAME: Iglesias Maqueda FIRST NAME: Ana Maria PASSPORT NUMBER: 6.251.356 DATE OF BIRTH: 05/18/1975 GENDER:
Usability Heuristics for Touchscreen-based Mobile Devices
Usability Heuristics for Touchscreen-based Mobile Devices Advisor: Dr. Cristian Rusu. Pontificia Universidad Católica de Valparaíso Facultad de Ingeniería Escuela de Ingeniería Informática Isabel Brown
Strategies to Reduce Defects in Floor and Wall Tiles; Application of Continuous Improvement Processes
Strategies to Reduce Defects in Floor and Wall Tiles; Application of Continuous Improvement Processes P. Del Solar and M. Del Río Abstract Continuous improvement is a key element in any business strategy,
UNIVERSIDAD PONTIFICIA COMILLAS FACULTY OF ECONOMICS AND BUSINESS ADMINISTRATION
UNIVERSIDAD PONTIFICIA COMILLAS FACULTY OF ECONOMICS AND BUSINESS ADMINISTRATION List of Subjects by Department 14-15 DEPARTAMENTO DE ECONOMÍA - DEPARTAMENT OF ECONOMICS Análisis de la Coyuntura Analysis
DOCUMENTOS DE TRABAJO Serie Gestión
Nº 130 A Lightweight Approach for Designing Enterprise Architectures Using BPMN: an Application in Hospitals O.Barros, R.Seguel, and A. Quezada DOCUMENTOS DE TRABAJO Serie Gestión Aceptado para presentacion
5.2 A Software Process Improvement Solution for Small and Medium-Size Enterprises
5.2 A Software Process Improvement Solution for Small and Medium-Size Enterprises Authors Jose A. Calvo-Manzano, Gonzalo Cuevas Agustin, Ivan Garcia Pacheco, Tomas San Feliu Gilabert, and Ariel Serrano
BPM FOR QUALITY ASSURANCE SYSTEMS IN HIGHER EDUCATION
Journal of Teaching and Education, CD-ROM. ISSN: 2165-6266 :: 03(02):175 183 (2014) Copyright c 2014 by UniversityPublications.net BPM FOR QUALITY ASSURANCE SYSTEMS IN HIGHER EDUCATION Vicente Cerverón-Lleó,
Automatic generation of fully-executable code from the Domain tier of UML diagrams
Abstract. Automatic generation of fully-executable code from the Domain tier of UML diagrams Macario Polo, Agustín Mayoral, Juan Ángel Gómez and Mario Piattini Alarcos Group - Department of Computer Science
A Systematic Review of Information Security Governance Frameworks in the Cloud Computing Environment
Journal of Universal Computer Science, vol. 18, no. 6 (2012), 798-815 submitted: 15/10/11, accepted: 15/2/12, appeared: 28/3/12 J.UCS A Systematic Review of Information Security Governance Frameworks in
Innovation and Teaching Technologies
Innovation and Teaching Technologies Marta Peris-Ortiz Fernando J. Garrigós-Simón Ignacio Gil Pechuán Editors Innovation and Teaching Technologies New Directions in Research, Practice and Policy Editors
How To Teach A Security Manager
ISACA: Certified Information Security Manager Certification Training Certified Information Security Manager (CISM) DESCRIPCIÓN: El programa de certificación CISM (Certified Information Security Manager)
DOCUSCHEMAS: EXPERIENCING WITH A MULTIMEDIA TOOL FOR SUPPORTING HIGHER EDUCATION
DOCUSCHEMAS: EXPERIENCING WITH A MULTIMEDIA TOOL FOR SUPPORTING HIGHER EDUCATION Carolina Franco Espinosa, Jose Jesus García Rueda, Rebeca Román Julián Departamento de Ingeniería Telemática, Universidad
Usability metrics for software components
Usability metrics for software components Manuel F. Bertoa and Antonio Vallecillo Dpto. Lenguajes y Ciencias de la Computación. Universidad de Málaga. {bertoa,av}@lcc.uma.es Abstract. The need to select
BUSINESS RULES AS PART OF INFORMATION SYSTEMS LIFE CYCLE: POSSIBLE SCENARIOS Kestutis Kapocius 1,2,3, Gintautas Garsva 1,2,4
International Conference 20th EURO Mini Conference Continuous Optimization and Knowledge-Based Technologies (EurOPT-2008) May 20 23, 2008, Neringa, LITHUANIA ISBN 978-9955-28-283-9 L. Sakalauskas, G.W.
Plan-Driven Methodologies
Plan-Driven Methodologies The traditional way to develop software Based on system engineering and quality disciplines (process improvement) Standards developed from DoD & industry to make process fit a
INSTITUTO POLITÉCNICO NACIONAL
SYNTHESIZED SCHOOL PROGRAM ACADEMIC UNIT: ACADEMIC PROGRAM: Escuela Superior de Cómputo Ingeniería en Sistemas Computacionales LEARNING UNIT: Software Engineering for Mobile Devices LEVEL: III AIM OF THE
COBIT 5 and the Process Capability Model. Improvements Provided for IT Governance Process
Proceedings of FIKUSZ 13 Symposium for Young Researchers, 2013, 67-76 pp The Author(s). Conference Proceedings compilation Obuda University Keleti Faculty of Business and Management 2013. Published by
Basic Unified Process: A Process for Small and Agile Projects
Basic Unified Process: A Process for Small and Agile Projects Ricardo Balduino - Rational Unified Process Content Developer, IBM Introduction Small projects have different process needs than larger projects.
New 4-year EHEA Degree on Computer Science (Information Systems) All courses taught in Spanish
New 4-year EHEA Degree on Computer Science (Information Systems) All courses taught in Spanish 1st year Autumn semester ECTS Spring semester ECTS Fundamentals of Programming 6 Object Oriented Programming
Mª de los Llanos Tobarra (UNED) and Salvador Ros (UNED): Analyzing the Students Behavior and Relevant Topics in Virtual Learning Communities
Página 1 emadrid Seminar on Big Data in Education Education Faculty National Distance Learning University (UNED) Friday, January 17, 2014 Organizes: emadrid Network Next Friday, January 17, 2014, a seminar
Europass Curriculum Vitae
Europass Curriculum Vitae Personal information First name(s) / Surname(s) Address Telephone(s) E-mail(s) Nationality Date of birth Gender +34 926822654 Mobile +34 658502565 [email protected] Spanish 31/05/1982
TOOLS SELECTIO CRITERIA I SOFTWARE-DEVELOPI G SMALL A D MEDIUM E TERPRISES
TOOLS SELECTIO CRITERIA I SOFTWARE-DEVELOPI G SMALL A D MEDIUM E TERPRISES Lornel Rivas General Education and Basic Sciences Department, Simón Bolívar University, Valle de Camurí Grande, Vargas, Venezuela
MDE Adoption in Industry: Challenges and Success Criteria
MDE Adoption in Industry: Challenges and Success Criteria Parastoo Mohagheghi 1, Miguel A. Fernandez 2, Juan A. Martell 2, Mathias Fritzsche 3 and Wasif Gilani 3 1 SINTEF, P.O.Box 124-Blindern, N-0314
CURRICULUM VITAE Julio Florentino del Corral Cuervo 26 th September, 2008
CURRICULUM VITAE Julio Florentino del Corral Cuervo 26 th September, 2008 Personal Data Birth Date: 23/11/1980 Personal Adress: Proffesional Adress: Homepage: E-mail adress: C/ Electra 17, 1º Izquierda,
Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation
Design Specification for IEEE Std 1471 Recommended Practice for Architectural Description IEEE Architecture Working Group 0 Motivation Despite significant efforts to improve engineering practices and technologies,
An Automated Workflow System Geared Towards Consumer Goods and Services Companies
Proceedings of the 2014 International Conference on Industrial Engineering and Operations Management Bali, Indonesia, January 7 9, 2014 An Automated Workflow System Geared Towards Consumer Goods and Services
TERRACENTRO Communication
TERRACENTRO Communication 2007 BICHO the biodiversity reporter Obra Social Caja Madrid. Consejería de Medio Ambiente de la Comunidad de Madrid 2007 GOTTA and her frinds in a circular adventure Obra Social
New publications of the Centre for Sociological Research, 15.30 to 16.00 (Centro de Investigaciones Sociológicas, CIS)
MESA HISPANA The Development of Social Network Analysis in Latin America 1st European Social Networks Conference (EUSN) http://jornades.uab.cat/eusn/ Universitat Autònoma de Barcelona, 1 de julio de 2014
Security In Information Systems WOSIS-2005
The Third International Workshop on Security In Information Systems WOSIS-2005 http://www.iceis.org/workshops/wosis/wosis2005-cfp.html May 24-25, 2005 Miami, USA First Announcement and Call for Papers
Updated: 18/2/2015 PERSONAL PROFILE
Carlos J. Perez del Pulgar Escuela de Ingenierías C/Ortiz Ramos s/n 29071 Málaga (Spain) Landline: +34 951952324 Email: [email protected] www.isa.uma.es/cperez Updated: 18/2/2015 PERSONAL PROFILE Since
Model-Driven Cloud Data Storage
Model-Driven Cloud Data Storage Juan Castrejón 1, Genoveva Vargas-Solar 1, Christine Collet 1, and Rafael Lozano 2 1 Université de Grenoble, LIG-LAFMIA, 681 rue de la Passerelle, Saint Martin d Hères,
Oracle Unified Method 5 Essentials (1Z0-568) Exam Study Guide. Kim Miller WWA&C Partner Enablement
Oracle Unified Method 5 Essentials (1Z0-568) Exam Study Guide Kim Miller WWA&C Partner Enablement Objective & Audience Objective To help you prepare to take the Oracle Unified Method 5 Essentials (1Z0-568)
34 942 20 20 63 34 676 112 620 34 942 20 14 02 [email protected] Spanish 27- January 1971 http://personales.unican.
PERSONAL INFORMATION Name Address Zorrilla Pantaleón, Marta Elena Mathematics, Statistics and Computation. Avda. Los Castros s/n. Santander. 39005. Spain Telephone Mobile Fax E-mail Nationality Date of
An Introduction to the Information Security Program Model (ISPM)
SECURELY ENABLING BUSINESS An Introduction to the Information Security Program Model (ISPM) Presented by: Nick Puetz VP of Strategic Services, FishNet Security David Robinson CIO, Lockton Companies AGENDA
ISO 9001 in software-developing VSEs assisted by the COMPETISOFT Model
ISO 9001 in software-developing VSEs assisted by the COMPETISOFT Model Silvia Esponda 1, Ariel Pasini, Patricia Pesado 1,2, Marcos Boracchia 1 {sesponda,apasini,ppesado,marcosb}@lidi.info.unlp.edu.ar 1
The Information and Communication Technologies in Tourism degree courses: The Reality of Iberian Peninsula
832 Vision 2020: Innovation, Development Sustainability, and Economic Growth The Information and Communication Technologies in Tourism degree courses: The Reality of Iberian Peninsula Elisabete Paulo Morais,
IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES
IMPLEMENTATION OF HIGH-PERFORMANCE SECURITY MANAGEMENT PROCESSES OBJECTIVES This course is specifically designed to improve your skills as an information security manager. Using O-ISM3 as a framework,
PREHISTORIC IBERIA. Genetics, Anthropology, and Linguistics
PREHISTORIC IBERIA Genetics, Anthropology, and Linguistics PREHISTORIC IBERIA Genetics, Anthropology, and Linguistics Edited by Antonio Arnaiz-Villena Hospital "12 de Octubre" Universidad Complutense Madrid,
Item transformation for computer assisted language testing: The adaptation of the Spanish University entrance examination
Available online at www.sciencedirect.com Procedia Social and Behavioral Sciences 2 (2010) 3586 3590 WCES-2010 Item transformation for computer assisted language testing: The adaptation of the Spanish
ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM
Computer Modelling and New Technologies, 2011, Vol.15, No.4, 41 45 Transport and Telecommunication Institute, Lomonosov 1, LV-1019, Riga, Latvia ANALYSIS OF WEB-BASED APPLICATIONS FOR EXPERT SYSTEM N.
Risk Management. Upasna Saluja, PhD Candidate. Dato Dr Norbik Bashah Idris
Risk Management Upasna Saluja, PhD Candidate Dato Dr Norbik Bashah Idris 1. Abstract Information is a key asset for organizations across industries as they seek to use IT as a differentiator and key business
340107 - INEL-E6O09 - Low, Medium and High Voltage Electrical Installations
Coordinating unit: 340 - EPSEVG - Vilanova i la Geltrú School of Engineering Teaching unit: 709 - EE - Department of Electrical Engineering Academic year: Degree: 2015 BACHELOR'S DEGREE IN ELECTRICAL ENGINEERING
DOCTORAL PROGRAM IN APPLIED LINGUISTICS
DOCTORAL PROGRAM IN APPLIED LINGUISTICS UNIVERSITY OF BARCELONA 2 DOCTORAL PROGRAM IN APPLIED LINGUISTICS UNIVERSITY OF BARCELONA Introduction 3 About the program: unique aspects Program overview 6 5 The
Software Development Emphasis in Informatics Engineering Curriculum
CREATIVE MATH. 13 (2004), 127-132 Software Development Emphasis in Informatics Engineering Curriculum Cristian Rusu and Jorge Bozo Abstract. A six-year undergraduate program in Informatics Engineering
Maintaining PCI-DSS compliance. Daniele Bertolotti [email protected] Antonio Ricci [email protected]
Maintaining PCI-DSS compliance Daniele Bertolotti [email protected] Antonio Ricci [email protected] Sessione di Studio Milano, 21 Febbraio 2013 Agenda 1 Maintaining PCI-DSS compliance
Curriculum Vitae Lic. José Rafael Pino Rusconi Chio +52 (998) 119 40 78 http://www.joserafaelpinorusconichio.com/ rpino67@hotmail.
Curriculum Vitae Lic. José Rafael Pino Rusconi Chio +52 (998) 119 40 78 http://www.joserafaelpinorusconichio.com/ [email protected] Content 1) Professional summary... 1 2) Professional Experience....
Information Security Risk Management
Information Security Risk Management Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA [email protected]
Analysis and Validation of Control-Flow Complexity Measures with BPMN Process Models
Analysis and Validation of Control-Flow Complexity Measures with BPMN Process Models Elvira Rolón 1, Jorge Cardoso 2, Félix García 1, Francisco Ruiz 1, Mario Piattini 1 1 Alarcos Research Group, University
Keywords: Sociocybernetics; System Dinamics; simulation models.
SIMULATION MODELS FOR THE KNOWLEDGE MANAGEMENT AND ITS MEASUREMENT (How can we apply the theory of the sociocybernetics in our concrete professional work or empirical research?) Author: Prof. Héctor Zamorano
Graduated with honors (Magna Cum Laude). Grade average: 9.6 over 10.
Esteban Meneses 1942 S Orchard St. Apt A, Urbana, IL 61801 217-344-0218 ([email protected]) Personal Data Passport Number: 303610389 Country of Origin: Costa Rica Civil status: married. Academic
TIGRE5-CM - Presentation
TIGRE5-CM - Presentation The aim of TIGRE5-CM project is to design an architecture for future generation mobile networks, based on the SDN (Software Defined Networking) paradigm, which eases the deployment,
