General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
|Published (Last):||1 March 2016|
|PDF File Size:||10.89 Mb|
|ePub File Size:||17.27 Mb|
|Price:||Free* [*Free Regsitration Required]|
Standard containing generally accepted descriptions of concepts and models for information eic communications technology security management. Isp provides interfaces to other organisational processes: The text is a direct resource for the implementation of security management.
The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.
Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security. International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: Target organisations Defines the most appropriate type of organisations the product aims at.
Geographical spread Information concerning the spread of this tool. This standard is currently under development; completion is expected for Regulatory compliance There is a given compliance of the product with international regulations. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company.
Download available when publishedbut isk for free. I’ve read it More information. Organisation processes integration The method provides interfaces to existing processes within the organisation. Technical integration of available lso Particular supporting tools see C-7 can be integrated with other tools.
ISO/IEC — ENISA
Management of information and communications technology security – Part2: To opt-out from analytics, click for more information.
The standard is not free of charge, and its provisions are not publicly available. Many Used in non-EU member states: For this reason, specific provisions cannot be quoted.
Date of first release: Concepts and models for information and communications technology security management. Information security risk management. Compliance to IT standards There is a compliance with jec national or international standard. The current version as of January Method phases supported Risk identification: Tools supporting the method List of tools that support the product.
Lifecycle Date of the first edition, date and number of actual version. Method or tool name: I’ve read it More information.
However, the standard is not free of charge, and its provisions are not publicly available. General information Basic information to identify the product. Trial before purchase Details regarding the evaluation period if any before purchase of the product. The standard is iao commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.
Skills needed Specify the level of skills needed to use and maintain the solution. License and certification scheme Specify the licensing and certification schemes available for this method. Not publicly available ISO standard, which can be voluntarily implemented.
International organisation based in Switzerland. Concepts and models for information and communications technology security management Source reference: We also use analytics.
To opt-out from analytics, click for more information. Identification Specify the phases this method supports and a short description. Level of reference of the product Details about the type of initiator of the product.