An automated tool for information security management system

Erkan, Ahmet
This thesis focuses on automation of processes of Information Security Management System. In accordance with two International Standards, ISO/IEC 27001:2005 and ISO/IEC 17799:2005, to automate the activities required for a documented ISMS as much as possible helps organizations. Some of the well known tools in this scope are analyzed and a comparative study on them including “InfoSec Toolkit”, which is developed for this purpose in the thesis scope, is given. “InfoSec Toolkit” is based on ISO/IEC 27001:2005 and ISO 17799:2005. Five basic integrated modules constituting the “InfoSec Toolkit” are “Gap Analysis Module”, “Risk Module”, “Policy Management Module”, “Monitoring Module” and “Query and Reporting Module”. In addition a research framework is proposed in order to assess the public and private organizations’ information security situation in Turkey.


Face detection in active robot vision
Önder, Murat; Halıcı, Uğur; Department of Electrical and Electronics Engineering (2004)
The main task in this thesis is to design a robot vision system with face detection and tracking capability. Hence there are two main works in the thesis: Firstly, the detection of the face on an image that is taken from the camera on the robot must be achieved. Hence this is a serious real time image processing task and time constraints are very important because of this reason. A processing rate of 1 frame/second is tried to be achieved and hence a fast face detection algorithm had to be used. The Eigenfa...
A compact cryptographic processor for IPSec applications
Kavun, Elif Bilge; Akyıldız, Ersan; Yalçın, Tolga; Department of Cryptography (2010)
A compact cryptographic processor with custom integrated cryptographic coprocessors is designed and implemented. The processor is mainly aimed for IPSec applications, which require intense processing power for cryptographic operations. In the present design, this processing power is achieved via the custom cryptographic coprocessors. These are an AES engine, a SHA-1 engine and a Montgomery modular multiplier, which are connected to the main processor core through a generic flexible interface. The processor ...
Software process improvement based on static process evaluation
Seçkin, Haldun; Bilgen, Semih; Department of Electrical and Electronics Engineering (2006)
This study investigates software development process improvement approaches. In particular, the static process evaluation methodology proposed by S. Güceğlioğlu is applied on the requirements analysis and validation process applied in Project X in MYCOMPANY and an improved process is proposed. That methodology is an extension of the ISO/IEC 9126 approach for software quality assessment, and is based on evaluating a set of well-defined metrics on the static model of software development processes. The improv...
An assessment and analysis tool for statistical process control of software process
Kırbaş, Serkan; Doğru, Ali Hikmet; Department of Computer Engineering (2007)
Statistical process control (SPC) which includes very powerful techniques used in other mature engineering disciplines for providing process control is not used by many software organizations. In software engineering domain, SPC is currently utilized only by organizations which have high maturity levels according to the process improvement models like CMM, ISO/IEC 15504 and CMMI. Guidelines and software tools to implement SPC techniques should be developed for effective use and dissemination of SPC especial...
Moving object identification and event recognition in video surveillance systems
Örten, Burkay Birant; Alatan, Abdullah Aydın; Department of Electrical and Electronics Engineering (2005)
This thesis is devoted to the problems of defining and developing the basic building blocks of an automated surveillance system. As its initial step, a background-modeling algorithm is described for segmenting moving objects from the background, which is capable of adapting to dynamic scene conditions, as well as determining shadows of the moving objects. After obtaining binary silhouettes for targets, object association between consecutive frames is achieved by a hypothesis-based tracking method. Both of t...
Citation Formats
A. Erkan, “An automated tool for information security management system,” M.S. - Master of Science, Middle East Technical University, 2006.