General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
Author: | Dogar Malacage |
Country: | Portugal |
Language: | English (Spanish) |
Genre: | Finance |
Published (Last): | 26 October 2012 |
Pages: | 25 |
PDF File Size: | 11.96 Mb |
ePub File Size: | 4.56 Mb |
ISBN: | 882-5-31390-618-1 |
Downloads: | 85428 |
Price: | Free* [*Free Regsitration Required] |
Uploader: | Kigajinn |
Many Used in non-EU member states: The standard is not free of charge, and its provisions are not publicly available.
ISO/IEC Standard — ENISA
For this reason, specific provisions cannot be quoted. I’ve read it More information. Concepts and models for information and communications technology security management. General information Basic information to identify the product.
Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. Geographical spread Information concerning the spread of this tool.
Identification Specify the phases this method supports and a short description. Management of information and communications technology security – Part2: To opt-out from analytics, click for more information.
ISO/IEC — ENISA
Concepts and models for information and communications technology security management Source reference: Organisation processes integration The method provides interfaces to existing 1335 within the organisation. This standard is currently under development; completion is expected for The text is a direct resource for the implementation of security management. To opt-out from analytics, click for more information.
Not publicly available ISO standard, which can be voluntarily implemented. Used in EU member states: The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.
ISO/IEC 13335-2
Skills needed Specify the level of skills ieo to use and maintain the solution. The current version as of January International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: We also use analytics.
Maturity level of the Information system The product iwo a means of measurement for the maturity of the information system security. Download available when publishedbut not for free. Method phases supported Risk identification: A new version is currently under development and expected to be finished in We also use analytics.
Method or tool name: I’ve read it More information. Target organisations Defines the most appropriate type of organisations the product aims at. The standard can be implemented in any sector confronted by technology security management. Method provides interfaces to other organisational processes: Compliance to IT standards There is a compliance with a national or international standard. Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools.
International organisation based in Switzerland. The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.
ISO/IEC Standard 13335
We use cookies on our website to support technical features that enhance your user experience. Languages List the available languages that the tool supports.
Level of reference of the product Details about the type of initiator of the product.
Consultancy support Specify the kind of support available. Lifecycle Date of the first edition, date and number of actual version.
Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. License and certification scheme Specify the licensing and certification schemes available for this method. No Existing certification scheme: We use cookies on our website to support technical features that enhance your user experience.
However, the standard is not free of charge, and its provisions are not publicly available. Information security risk management. Regulatory compliance There is a given compliance of the product with international regulations.
Tools supporting the method List of tools that support the product.