{"title":"Evaluating informatics security in an organization: The minimal distance method","authors":"F. D. Felipe, E. Acevedo, M. Sánchez","doi":"10.1109/INTERCON.2017.8079676","DOIUrl":null,"url":null,"abstract":"This work presents a methodology for evaluating informatics security in any kind of organization. We use the ISO-27002/2013 standard and the Mexican equivalent NMX-I27002.NYCE-2009 as basis to follow. The standards stablish fourteen controls: human factors, technological, process, and legal controls. The organization must choose adequate controls for it, then It can use the ”Minimal Distance Method to the ideal” to evaluate its Informatics Security. The method allows customize an ideal point for n parameters to evaluate and each organization can define its own ideal point to reach.","PeriodicalId":229086,"journal":{"name":"2017 IEEE XXIV International Conference on Electronics, Electrical Engineering and Computing (INTERCON)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE XXIV International Conference on Electronics, Electrical Engineering and Computing (INTERCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/INTERCON.2017.8079676","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This work presents a methodology for evaluating informatics security in any kind of organization. We use the ISO-27002/2013 standard and the Mexican equivalent NMX-I27002.NYCE-2009 as basis to follow. The standards stablish fourteen controls: human factors, technological, process, and legal controls. The organization must choose adequate controls for it, then It can use the ”Minimal Distance Method to the ideal” to evaluate its Informatics Security. The method allows customize an ideal point for n parameters to evaluate and each organization can define its own ideal point to reach.