General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.
|Published (Last):||22 September 2009|
|PDF File Size:||1.20 Mb|
|ePub File Size:||5.33 Mb|
|Price:||Free* [*Free Regsitration Required]|
ISO/IEC — ENISA
We also use analytics. Geographical spread Information concerning the spread of this tool.
Tools supporting the method List of tools that support the 1333. The text is a direct resource for the implementation of security management. Languages List the available languages that the tool supports. General information Basic information to identify the product.
Identification Specify the phases this method supports and a short description. The standard can be implemented in any sector confronted by technology security management.
Information security risk management.
Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. We also use analytics.
ISO/IEC Standard — ENISA
I’ve read it More information. Trial before purchase Details regarding the evaluation period if any before purchase of the product. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. Concepts and models for information and communications technology security management Source reference: To opt-out from analytics, click for more information.
International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: The current version as of January International organisation based in Switzerland. Method provides interfaces to other organisational processes: Management of information and communications technology security – Part2: For this reason, specific provisions cannot be quoted.
A new version is currently under development and expected to be finished in Not publicly available ISO standard, which can be voluntarily implemented.
Consultancy support Specify the kind of support available.
Method phases supported Risk identification: Lifecycle Date of the first edition, date and number of actual version. Used isso EU member states: Date of first release: The standard is not free of charge, and its provisions are not publicly available. The standard is a commonly io code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.
The lso contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.
Compliance to IT standards There is a compliance with a national or international standard. No Existing certification scheme: Level of reference of the product Details about the type of initiator of the product.
This standard is currently under development; completion is expected for Method or tool name: Concepts and models iwo information and communications technology security management. Skills needed Specify the level of skills needed to use and maintain the solution. Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security.
I’ve read it More information. License and certification scheme Specify the licensing and certification schemes available for this method. ISO Country of isso Target organisations Defines the most appropriate type of organisations the product aims at.
However, the standard is not free of charge, and its provisions are not publicly available.