SlideShare une entreprise Scribd logo
1  sur  32
HOW TO BUILD EFFECTIVE FORMS
• IF A FIELD REPEATS THEN DESIGN IT AS COLUMNS OTHERWISE ROWS
• FORM NO AND FORM NAME MUST BE UNIQUE.
• FORM NAME SHOULD DESCRIBE ITSELF
• IF POSSIBLE, DATA ENTRY SCREEN AND FORM DESIGN SHOULD BE
SIMILAR.
• IF THE FORM IS USED IN COMPUTER, USE COMBO BOX STRUCTURE IF
POSSIBLE.
• IF POSSIBLE, FORM NAME AND FORM NAME IN COMPUTER MUST BE THE
SAME.
HOW TO BUILD EFFECTIVE REPORTS:
• TIME OF REPORT & DATE on every Page
• TOTAL-AVERAGE-COUNT ETC.
• DISC-MONITOR-PRINT
What is BALANCED SCORECARD?
Don’t forget to read the following paper !
• Cebeci, U. (2009). Fuzzy AHP-based decision
support system for selecting ERP systems in
textile industry by using balanced
scorecard. Expert Systems with
Applications, 36(5), 8900-8909.
ARTIFICIAL INTELLIGENCE
• EXPERT SYSTEMS-(Chess Game, DIAGNOSIS
• FUZZY LOGIC
• PATTERN RECOGNITION
• ROBOTICS
• MACHINE LEARNING
• NATURAL LANGUAGE PROCESSING
• SEARCH ENGINES
• NEURAL NETWORKS
• GENETIC ALGORITHMS
TG4.1 Introduction to Intelligent Systems
Intelligent systems
Artificial intelligence (AI)
© Luis Alonso Ocana/Age Fotostock America, Inc.
TG 4.2 Expert Systems
Expertise
Expert systems (ESs)
Expertise Transfer from Human to Computer
Knowledge acquisition
Knowledge representation
Knowledge inferencing
Knowledge transfer
The Components of Expert Systems
Knowledge base
Inference engine
User interface
Blackboard
Explanation subsystem
TG4.3 Neural Network
TG 4.5 Genetic Algorithms
Genetic algorithms have three functional
characteristics:
• Selection
• Crossover:
• Mutation:
TG 4.6 Intelligent Agents
Information Agents
Monitoring-and-Surveillance Agents
User Agents
Fuzzy Logic
• By using fuzzy logic, we can convert some
linguistic variables to numbers so that we can
process the values in computers.
• Define membership function : to be tall for
turkish boys
• (Example: To be old)
Information Security
Management System (ISMS)
ISO 27001 Standard
What is ISMS?
• That part of the overall management system,
based on a business risk approach, to establish,
implement, operate, monitor, review, maintain
and improve information security.
(ISO/IEC 27001:2005 Clause 3.7)
INFORMATION SECURITY
MANAGEMENT
Factors affecting ISMS
Escalating Risk
Globalization
Legislation
Government
NGOs
Competition - cost
Corporate culture
Employee
Union Corporate vision & policy
Shareholder
Customer
requirements
Consumer
Competition-
business
Neighbor
Societal values
Risk tolerance
Insurance
Compatibility with other standards
• ISO 9001
Quality Management Systems – requirements
• ISO 14001
Environmental Management Systems – specification
with guidance for use
PURPOSE OF ISO 27001
Benefits of ISMS
• To protect an organization’s information assets in
order to: ensure business continuity, minimize
business damage, and maximize return on
investments
• Internationally recognized, structured methodology
• Defined process to evaluate, implement, maintain,
and manage information security,
• Tailored policies, standards, procedures, and
guidelines
Benefits of ISMS
• Efficient and effective security planning and
management
• Increased credibility, trust and confidence of partners
and customers
• Compliance to all relevant commitment
• Compatibility with other standards
Information security concepts
Plan-Do-Check-Act cycle & Continual Improvement
Take actions to
continually improve
process performance
– effectiveness and
efficiency
Establish objectives
necessary to deliver
results in accordance
with customer
requirements and the
organization’s policies
Implement the processesMonitor and measure
processes and product
against policies,
objectives and
requirements
PDCA Model applied to ISMS processes
ISO 27001 REQUIREMENTS
ISO 27001 Requirements
• 1 Scope
– 1.1 General
– 1.2 Application
• 2 Normative References
• 3 Term and definitions
• 4 Information security management system
– 4.1 General requirements
– 4.2 Establishing and managing the ISMS
– 4.3 Documentation requirements
ISO 27001 Requirements
• 5 Management Responsibility
– 5.1 Management commitment
– 5.2 Resource management
• 6 Internal ISMS audits
• 7 Management review of the ISMS
– 7.1 General
– 7.2 Review input
– 7.3 Review output
ISO 27001 Requirements
• 8 ISMS Improvement
– 8.1 Continual improvement
– 8.2 Corrective action
– 8.3 Preventive action
Audit / Certification Process
Pre-assessment (Optional)
Stage 1: Desk Study
Stage 2: Certification Audit
Surveillance 1
Surveillance 2
Surveillance 3 Surveillance 3
Surveillance 5
Stage 1: Desk Study
•Evaluate the location and site-
specific conditions
•Collection of information
regarding the scope of supply
chain SMS, information about
risk assessment performed and
processes
•Relevant ISMS documentation
and records
•Previous audit reports
Stage 2: Certification Audit
•Obtain information and
evidence about conformity to
all requirements of the
applicable normative document
•Operational control
•Internal auditing and
Management review
Surveillance Audits
•Maintenance visits
•Verify continuous
implementation of the system
in accordance with the
requirements of the standard
•Evaluation of the effectiveness
of corrective action
implementation to previously
raised NCs
Failure Mode and Effects Analysis
Technique for Information Security
• Fill the second line above (fire risk) for the
company

Contenu connexe

Tendances

Chapter 2 Decision Making
Chapter 2 Decision MakingChapter 2 Decision Making
Chapter 2 Decision MakingUMaine
 
C. executive information systems
C. executive information systemsC. executive information systems
C. executive information systemsgohilrajdipsinh
 
Welcome To BUA 235-Intro
Welcome To BUA 235-IntroWelcome To BUA 235-Intro
Welcome To BUA 235-IntroUMaine
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systemsSuleyman Ally
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork UMaine
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information SystemTheju Paul
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235UMaine
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)Saumya Singh
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )Puja Dhakal
 
Executive Information System or Executive Support System
Executive Information System or Executive Support SystemExecutive Information System or Executive Support System
Executive Information System or Executive Support SystemSaurav (Srv) Singhania
 
Executive information sysytem
Executive  information sysytemExecutive  information sysytem
Executive information sysytemHimanshu Sahu
 
Management Information System
Management Information SystemManagement Information System
Management Information SystemJunaid Ashraf
 
Chap 6 IMplementation of Information System
Chap 6 IMplementation of Information SystemChap 6 IMplementation of Information System
Chap 6 IMplementation of Information SystemSanat Maharjan
 
Executive Supportive System
Executive Supportive SystemExecutive Supportive System
Executive Supportive Systemsadhish jain
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Informationmrcox
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork UMaine
 

Tendances (20)

Chapter 2 Decision Making
Chapter 2 Decision MakingChapter 2 Decision Making
Chapter 2 Decision Making
 
C. executive information systems
C. executive information systemsC. executive information systems
C. executive information systems
 
Welcome To BUA 235-Intro
Welcome To BUA 235-IntroWelcome To BUA 235-Intro
Welcome To BUA 235-Intro
 
Three dimensions of information systems
Three dimensions of information systemsThree dimensions of information systems
Three dimensions of information systems
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 
Executive Information System
Executive Information SystemExecutive Information System
Executive Information System
 
Week 1 bua 235
Week 1 bua 235Week 1 bua 235
Week 1 bua 235
 
Executive support system (ess)
Executive support system (ess)Executive support system (ess)
Executive support system (ess)
 
Executive information system ( eis )
Executive information system ( eis )Executive information system ( eis )
Executive information system ( eis )
 
Executive Information System or Executive Support System
Executive Information System or Executive Support SystemExecutive Information System or Executive Support System
Executive Information System or Executive Support System
 
Excicutive information system
Excicutive information systemExcicutive information system
Excicutive information system
 
Executive information sysytem
Executive  information sysytemExecutive  information sysytem
Executive information sysytem
 
Management Information System
Management Information SystemManagement Information System
Management Information System
 
Chap 6 IMplementation of Information System
Chap 6 IMplementation of Information SystemChap 6 IMplementation of Information System
Chap 6 IMplementation of Information System
 
Executive Supportive System
Executive Supportive SystemExecutive Supportive System
Executive Supportive System
 
BTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs InformationBTEC National in ICT: Unit 3 - Data vs Information
BTEC National in ICT: Unit 3 - Data vs Information
 
Eis
EisEis
Eis
 
Management Support System
Management Support SystemManagement Support System
Management Support System
 
Bua 235 teamwork
Bua 235 teamwork Bua 235 teamwork
Bua 235 teamwork
 

Similaire à Artificial intelligence bsc - iso 27001 information security

ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewShankar Subramaniyan
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentationPranay Kumar
 
Application of mis in textile industry
Application of mis in textile industryApplication of mis in textile industry
Application of mis in textile industryMajharul Islam
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurancea3virani
 
Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Meghna Verma
 
Mark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment JourneyMark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment JourneyIBM Sverige
 
Audit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsAudit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsCaseWare IDEA
 
Ch20ed12romney
Ch20ed12romneyCh20ed12romney
Ch20ed12romneywoyaoni
 
Training presentation for the audit ISO9001, ISO45001, ISO14001
Training presentation for the audit ISO9001, ISO45001, ISO14001Training presentation for the audit ISO9001, ISO45001, ISO14001
Training presentation for the audit ISO9001, ISO45001, ISO14001ManishChoudhary121599
 
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!Richard Robinson
 

Similaire à Artificial intelligence bsc - iso 27001 information security (20)

MES systems
MES systemsMES systems
MES systems
 
ISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process OverviewISO27001: Implementation & Certification Process Overview
ISO27001: Implementation & Certification Process Overview
 
Isms awareness presentation
Isms awareness presentationIsms awareness presentation
Isms awareness presentation
 
Application of mis in textile industry
Application of mis in textile industryApplication of mis in textile industry
Application of mis in textile industry
 
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
Overview of ISO 27001 [null Bangalore] [Dec 2013 meet]
 
Chapter 1 Security Framework
Chapter 1   Security FrameworkChapter 1   Security Framework
Chapter 1 Security Framework
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
Professional Designations IT Assurance
Professional Designations IT AssuranceProfessional Designations IT Assurance
Professional Designations IT Assurance
 
Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799Comparison of it governance framework-COBIT, ITIL, BS7799
Comparison of it governance framework-COBIT, ITIL, BS7799
 
Mark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment JourneyMark Willemse - Strategy & Deployment Journey
Mark Willemse - Strategy & Deployment Journey
 
sdlc.pptx
sdlc.pptxsdlc.pptx
sdlc.pptx
 
Mis
MisMis
Mis
 
Sadchap01
Sadchap01Sadchap01
Sadchap01
 
Audit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data AnalyticsAudit Webinar: Surefire ways to succeed with Data Analytics
Audit Webinar: Surefire ways to succeed with Data Analytics
 
Ch20ed12romney
Ch20ed12romneyCh20ed12romney
Ch20ed12romney
 
IMS .ppt
IMS .pptIMS .ppt
IMS .ppt
 
Training presentation for the audit ISO9001, ISO45001, ISO14001
Training presentation for the audit ISO9001, ISO45001, ISO14001Training presentation for the audit ISO9001, ISO45001, ISO14001
Training presentation for the audit ISO9001, ISO45001, ISO14001
 
Chapter 10 supporting decision making
Chapter 10  supporting decision makingChapter 10  supporting decision making
Chapter 10 supporting decision making
 
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
SCRIMPS-STD: Test Automation Design Principles - and asking the right questions!
 
Chapter01.ppt
Chapter01.pptChapter01.ppt
Chapter01.ppt
 

Dernier

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 

Dernier (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 

Artificial intelligence bsc - iso 27001 information security

  • 1. HOW TO BUILD EFFECTIVE FORMS • IF A FIELD REPEATS THEN DESIGN IT AS COLUMNS OTHERWISE ROWS • FORM NO AND FORM NAME MUST BE UNIQUE. • FORM NAME SHOULD DESCRIBE ITSELF • IF POSSIBLE, DATA ENTRY SCREEN AND FORM DESIGN SHOULD BE SIMILAR. • IF THE FORM IS USED IN COMPUTER, USE COMBO BOX STRUCTURE IF POSSIBLE. • IF POSSIBLE, FORM NAME AND FORM NAME IN COMPUTER MUST BE THE SAME. HOW TO BUILD EFFECTIVE REPORTS: • TIME OF REPORT & DATE on every Page • TOTAL-AVERAGE-COUNT ETC. • DISC-MONITOR-PRINT
  • 2. What is BALANCED SCORECARD?
  • 3.
  • 4. Don’t forget to read the following paper ! • Cebeci, U. (2009). Fuzzy AHP-based decision support system for selecting ERP systems in textile industry by using balanced scorecard. Expert Systems with Applications, 36(5), 8900-8909.
  • 5. ARTIFICIAL INTELLIGENCE • EXPERT SYSTEMS-(Chess Game, DIAGNOSIS • FUZZY LOGIC • PATTERN RECOGNITION • ROBOTICS • MACHINE LEARNING • NATURAL LANGUAGE PROCESSING • SEARCH ENGINES • NEURAL NETWORKS • GENETIC ALGORITHMS
  • 6. TG4.1 Introduction to Intelligent Systems Intelligent systems Artificial intelligence (AI) © Luis Alonso Ocana/Age Fotostock America, Inc.
  • 7. TG 4.2 Expert Systems Expertise Expert systems (ESs)
  • 8. Expertise Transfer from Human to Computer Knowledge acquisition Knowledge representation Knowledge inferencing Knowledge transfer
  • 9. The Components of Expert Systems Knowledge base Inference engine User interface Blackboard Explanation subsystem
  • 11. TG 4.5 Genetic Algorithms Genetic algorithms have three functional characteristics: • Selection • Crossover: • Mutation:
  • 12. TG 4.6 Intelligent Agents Information Agents Monitoring-and-Surveillance Agents User Agents
  • 13. Fuzzy Logic • By using fuzzy logic, we can convert some linguistic variables to numbers so that we can process the values in computers. • Define membership function : to be tall for turkish boys • (Example: To be old)
  • 14.
  • 15. Information Security Management System (ISMS) ISO 27001 Standard
  • 16. What is ISMS? • That part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security. (ISO/IEC 27001:2005 Clause 3.7)
  • 17. INFORMATION SECURITY MANAGEMENT Factors affecting ISMS Escalating Risk Globalization Legislation Government NGOs Competition - cost Corporate culture Employee Union Corporate vision & policy Shareholder Customer requirements Consumer Competition- business Neighbor Societal values Risk tolerance Insurance
  • 18. Compatibility with other standards • ISO 9001 Quality Management Systems – requirements • ISO 14001 Environmental Management Systems – specification with guidance for use
  • 19. PURPOSE OF ISO 27001
  • 20. Benefits of ISMS • To protect an organization’s information assets in order to: ensure business continuity, minimize business damage, and maximize return on investments • Internationally recognized, structured methodology • Defined process to evaluate, implement, maintain, and manage information security, • Tailored policies, standards, procedures, and guidelines
  • 21. Benefits of ISMS • Efficient and effective security planning and management • Increased credibility, trust and confidence of partners and customers • Compliance to all relevant commitment • Compatibility with other standards
  • 23. Plan-Do-Check-Act cycle & Continual Improvement Take actions to continually improve process performance – effectiveness and efficiency Establish objectives necessary to deliver results in accordance with customer requirements and the organization’s policies Implement the processesMonitor and measure processes and product against policies, objectives and requirements
  • 24. PDCA Model applied to ISMS processes
  • 25.
  • 27. ISO 27001 Requirements • 1 Scope – 1.1 General – 1.2 Application • 2 Normative References • 3 Term and definitions • 4 Information security management system – 4.1 General requirements – 4.2 Establishing and managing the ISMS – 4.3 Documentation requirements
  • 28. ISO 27001 Requirements • 5 Management Responsibility – 5.1 Management commitment – 5.2 Resource management • 6 Internal ISMS audits • 7 Management review of the ISMS – 7.1 General – 7.2 Review input – 7.3 Review output
  • 29. ISO 27001 Requirements • 8 ISMS Improvement – 8.1 Continual improvement – 8.2 Corrective action – 8.3 Preventive action
  • 30. Audit / Certification Process Pre-assessment (Optional) Stage 1: Desk Study Stage 2: Certification Audit Surveillance 1 Surveillance 2 Surveillance 3 Surveillance 3 Surveillance 5 Stage 1: Desk Study •Evaluate the location and site- specific conditions •Collection of information regarding the scope of supply chain SMS, information about risk assessment performed and processes •Relevant ISMS documentation and records •Previous audit reports Stage 2: Certification Audit •Obtain information and evidence about conformity to all requirements of the applicable normative document •Operational control •Internal auditing and Management review Surveillance Audits •Maintenance visits •Verify continuous implementation of the system in accordance with the requirements of the standard •Evaluation of the effectiveness of corrective action implementation to previously raised NCs
  • 31. Failure Mode and Effects Analysis Technique for Information Security
  • 32. • Fill the second line above (fire risk) for the company