General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
|Published (Last):||3 January 2010|
|PDF File Size:||12.91 Mb|
|ePub File Size:||14.64 Mb|
|Price:||Free* [*Free Regsitration Required]|
Method or tool name: However, the is is not free of charge, and its provisions are not publicly available. Management of information and communications technology security – Part2: Trial before purchase Details regarding the evaluation period if any before purchase of the product.
We also use analytics. Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. General information Basic information to identify the product. For this reason, specific provisions cannot be quoted. Method phases supported Risk identification: Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security. Consultancy support Specify the kind of uso available.
The standard can be implemented in any sector confronted by technology security management.
Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: Concepts and models for information and communications technology security management.
Languages List the available languages that the tool supports. Regulatory compliance There is a given compliance of the product with international regulations.
Tools supporting the method List of tools that support the product. This standard is currently under development; completion is expected for To opt-out from analytics, click for more information. Not publicly available ISO standard, which can oso voluntarily implemented. Information security risk management.
Identification Specify the phases this method supports and a short description. Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools.
Method provides interfaces to other organisational processes: The text is a direct resource for the implementation of security management. Level of reference of the product Details about the type of initiator of the product.
ISO Country of origin: I’ve read it More information. Used in EU member states: License and certification scheme Specify the licensing and certification schemes available for this method. The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities irc security controls.
We also use analytics. Many Used in non-EU member states: