BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 by BSI


BS ISO/IEC 27002:2005 is the foreign regular for info safety administration, supporting you to accomplish criminal compliance, attractiveness and stakeholder self assurance. It outlines the final rules of designing, imposing, keeping and enhancing info safeguard. BS ISO/IEC 27002:2005 additionally contains useful instructions for constructing protection criteria and potent info administration throughout your corporation. Compliance with the traditional will let you installed position powerful probability administration and audit controls.

Show description

Read or Download BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 Information technology. Security techniques. Code of practice for information security management PDF

Similar security books

Information Security Fundamentals (2nd Edition)

Constructing a data safety application that clings to the primary of protection as a company enabler needs to be step one in an enterprise’s attempt to construct a good safeguard software. Following within the footsteps of its bestselling predecessor, info safeguard basics, moment variation offers info protection pros with a transparent figuring out of the basics of defense required to deal with the variety of concerns they'll event within the box.

Securing VoIP: Keeping Your VoIP Network Safe

Securing VoIP: protecting Your VoIP community secure will make it easier to take the initiative to avoid hackers from recording and exploiting your company's secrets and techniques. Drawing upon years of functional event and utilizing a number of examples and case stories, know-how guru Bud Bates discusses the company realities that necessitate VoIP procedure safeguard and the threats to VoIP over either twine and instant networks.

Trust, Privacy and Security in Digital Business: 6th International Conference, TrustBus 2009, Linz, Austria, September 3-4, 2009. Proceedings

This publication constitutes the refereed complaints of the sixth foreign convention on belief and privateness in electronic company, TrustBus 2009, held in Linz, Austria, in September 2009 together with DEXA 2009. The sixteen revised complete papers offered have been conscientiously reviewed and chosen from a number of submissions.

Trust, Privacy and Security in Digital Business: 7th International Conference, TrustBus 2010, Bilbao, Spain, August 30-31, 2010. Proceedings

This booklet offers the complaints of the seventh foreign convention on belief, P- vacy and defense in electronic enterprise (TrustBus 2010), held in Bilbao, Spain in the course of August 30–31, 2010. The convention persevered from earlier occasions held in Zaragoza (2004), Copenhagen (2005), Krakow (2006), Regensburg (2007), Turin (2008) and Linz (2009).

Extra info for BS ISO/IEC 27002:2005, BS 7799-1:2005,BS ISO/IEC 17799:2005 Information technology. Security techniques. Code of practice for information security management

Sample text

1). 2) to define the classification of an asset, periodically review it, and ensure it is kept up to date and at the appropriate level. 2. Consideration should be given to the number of classification categories and the benefits to be gained from their use. Overly complex schemes may become cumbersome and uneconomic to use or prove impractical. Care should be taken in interpreting classification labels on documents from other organizations, which may have different definitions for the same or similarly named labels.

Information on all candidates being considered for positions within the organization should be collected and handled in accordance with any appropriate legislation existing in the relevant jurisdiction. Depending on applicable legislation, the candidates should be informed beforehand about the screening activities. 3 Terms and conditions of employment Control As part of their contractual obligation, employees, contractors and third party users should agree and sign the terms and conditions of their employment contract, which should state their and the organization’s responsibilities for information security.

Other information Options to achieve continuity of power supplies include multiple feeds to avoid a single point of failure in the power supply. 3 Cabling security Control Power and telecommunications cabling carrying data or supporting information services should be protected from interception or damage. 4 Equipment maintenance Control Equipment should be correctly maintained to ensure its continued availability and integrity. Implementation guidance The following guidelines for equipment maintenance should be considered: a) equipment should be maintained in accordance with the supplier’s recommended service intervals and specifications; b) only authorized maintenance personnel should carry out repairs and service equipment; c) records should be kept of all suspected or actual faults, and all preventive and corrective maintenance; d) appropriate controls should be implemented when equipment is scheduled for maintenance, taking into account whether this maintenance is performed by personnel on site or external to the organization; where necessary, sensitive information should be cleared from the equipment, or the maintenance personnel should be sufficiently cleared; e) all requirements imposed by insurance policies should be complied with.

Download PDF sample

Rated 4.84 of 5 – based on 36 votes