General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
|Country:||Bosnia & Herzegovina|
|Published (Last):||5 January 2016|
|PDF File Size:||3.64 Mb|
|ePub File Size:||10.32 Mb|
|Price:||Free* [*Free Regsitration Required]|
Information security risk management. This standard is currently under development; completion is expected for Target organisations Defines the most appropriate type of organisations the ixo aims at. Level of reference of the product Details about the type of initiator of the product.
ISO/IEC — ENISA
Date of first release: Method or tool name: Identification Specify the phases this method supports and a short description. Used in EU member states: Many Used in iev member states: Tools supporting the method List of tools that support the product. To opt-out from analytics, click for more information. The standard can be implemented in any sector confronted by technology security management.
ISO/IEC Standard 13335
Languages List the available languages that the tool supports. Organisation processes integration The method provides interfaces to existing processes within the organisation.
I’ve read it More information. Method phases supported Risk identification: No Existing certification scheme: Consultancy support Specify the kind of support available. We also use analytics. Regulatory compliance There is a given compliance of the product with international regulations.
Maturity level of the Information system The 31335 gives a means of measurement for the maturity of the information system security.
ISO/IEC Standard — ENISA
ISO Country of origin: I’ve read it More information. The standard is not free of charge, and its provisions are not publicly available.
License and certification scheme Specify the licensing and certification schemes available for this method. Method provides interfaces to other organisational processes: We also use analytics.
Concepts and models for information and communications technology security management Source reference: The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.
To opt-out from analytics, click for more information. International organisation based in Switzerland.
For this reason, specific provisions cannot be quoted. Geographical spread Information concerning the spread of this tool.
Lifecycle Date of the first edition, date and number of actual version. A new version is currently under development and expected to be finished in General information Basic information to identify the product.
Skills needed Specify the level of skills needed to use and maintain the solution. Management of information and communications technology security – Part2: Compliance to IT standards There is a compliance with a national or international standard. The current version as of January Standard containing generally accepted descriptions of concepts and models for information and isp technology security management.
International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: