Security maturity assessment method.

A mature and safe technology, applied in computer security devices, instruments, preventing unauthorized use of memory, etc.

Inactive Publication Date: 2005-12-28
SCHLUMBERGER OMNES
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Assessments obtained from applying the SSE-CCM are generally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security maturity assessment method.
  • Security maturity assessment method.
  • Security maturity assessment method.

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Exemplary embodiments of the present invention are described with reference to the accompanying drawings. Throughout the drawings, for consistency, like items are indicated by like reference numerals.

[0014] In the following detailed description of the invention, numerous specific details are set forth in order to provide a better understanding of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known features have not been described in detail so as not to obscure the invention.

[0015] The present invention relates to a method for assessing the security maturity of an organization. In addition, the present invention also relates to utilizing a security assessment matrix to assess an organization's security maturity. In addition, the present invention also relates to base the safety assessment matrix on the BS7799 / ISO17799 standard and the Cap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A methodology for evaluating an organization's information security policy and implementation that includes: identifying risks associated with information security policy and implementation; collecting information about information security policy and implementation; using the information collected using a security maturity assessment matrix, and risks associated with information security policies and implementations; use the scores to generate a list of corrective activities, perform corrective action lists to create new security information policies and implementations, and monitor new security information policies and implementations.

Description

Background technique [0001] Information security involves preventing unauthorized disclosure, transfer, modification or destruction of information, whether accidental or intentional. Information security has become a pervasive concern for organizations due to trends in electronic commerce, electronic commerce, universal e-mail and World Wide Web access, and fully open security development. As a result, organizations continually attempt to apply information security principles within corporate structures. [0002] A number of information standards and tools have been developed to enable agencies to apply information security principles in corporate structures. A widely accepted standard, BS7799 / ISO17799, was developed by the British Standards Institution (BSI) and adopted by the International Organization for Standardization (ISO). The BS7799 / ISO17799 standard is a comprehensive set of controls outlining best practices for information security. The purpose of BS7799 / ISO17799...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F1/00G06F12/14G06F21/06G06Q10/10
CPCG06Q40/08
Inventor C·R·博杜安C·R·埃利奥特
Owner SCHLUMBERGER OMNES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products