Information Security Management: THE ISO 27000 (ISO 27K) SERIES

Research output: Non-textual formWeb publication/site


The flexibility of digital information can be regarded as a great strength. As software and hardware develop, data can be created, accessed, edited, manipulated and shared with increasing ease, The corollary is that data is vulnerable to unauthorised access, alteration or manipulation, which without checks can easily go undetected, and undermine its authoritative nature. Successful digital curation ensures that data is managed and protected so that its authority is maintained and retained throughout the curation lifecycle. To be authoritative data needs to remain authentic, reliable and useable, while retaining its integrity. These characteristics of data can be preserved through the implementation of an effective Information Security Management Systems (ISMS). The policies, procedures, human and machine resources which constitute an ISMS should ensure that the CIA Triad ? Confidentiality, Integrity and Availability ? is maintained across an organisation's physical, personal and organisational layers. Confidentiality ensures that data is only available to those authorised to access it. Integrity ensures that data can only be altered by authorised persons. Availability demands that authorised persons can access data when they require. The ISO/IEC 27000 Series is a series of standards which, when used together, specify the complete implementation of an ISMS. This paper examines the benefits of implementing them while curating datasets.
Original languageEnglish
Place of PublicationDigital Curation Centre website:
PublisherDigital Curation Centre
Media of outputOnline
Publication statusPublished - 31 Mar 2009


Dive into the research topics of 'Information Security Management: THE ISO 27000 (ISO 27K) SERIES'. Together they form a unique fingerprint.

Cite this