: ISO/IEC , Information technology – Security techniques – Management of information and communications technology security – Part. Title: ISO/IEC – Information technology — Security techniques — Management of information and communications technology security — Part 1. International Organization for Standardization’s (ISO)  standards and guides for conformity The ISO/IEC  standard is dedicated in providing.
|Published (Last):||28 December 2009|
|PDF File Size:||4.33 Mb|
|ePub File Size:||19.44 Mb|
|Price:||Free* [*Free Regsitration Required]|
ISO/IEC Standard — ENISA
This collection of threats changes constantly over time and is only partially known. A vulnerability can exist in the absence of corresponding threats. ICT security risk should be managed in consideration of the organization’s objectives, strategies and policies. These areas should mutually support each other and the overall ICT security process by sharing information on security aspects, which can be used to support the management decision-making process.
The role of a corporate ICT security officer includes: The goals of ICT security should be promulgated throughout the organization. Each of these components, i. A business-wide commitment to the goals of ICT security includes: Each of the elements is introduced, and the major contributing factors are identified. According to the security objectives, and the strategy an organization has adopted to achieve these objectives, the appropriate level of detail for the corporate ICT security policy is determined.
The level of detail for this exercise should be measured in terms of time and cost versus the value of the assets, hi any case, the level of detail should be determined on the basis of the security objectives. Aspects of environment and culture must be considered when addressing threats. The more an organization relies on ICT, the more important ICT security is, to help ensure that the business objectives are met.
Your basket is empty. ICT security should be a continuous process with many feedbacks within and between an ICT system’s lifecycle phases.
Regardless of the documentation and organizational structure in use by the organization, it is important that the different messages of the policies described are addressed, and that consistency is maintained.
Security administrators must have the appropriate training to administer the specific activities and tools.
ISO/IEC Standard 13335
As discussed earlier in this clause, the results of previous risk assessment reviews, security compliance checking and information security incidents may have an effect on the corporate ICT security policy. Technical standards need to be complemented by 13335-1 and guidelines on their implementation and use.
Scenario 5 – A vulnerability exists but there are no known threats to exploit it. You may experience issues viewing this site in Internet Explorer 9, 10 or For example, some cultures consider the protection of personal information as very important while others give a lower significance to this issue.
There may be a suitable person who can take on the additional responsibilities of the corporate ICT security officer, although, in medium and large organizations, it is recommended that a dedicated post be established. A threat may arise from within the organization, for example, sabotage by an employee, or from outside, for example, malicious hacking or industrial espionage. The topics could be quite specific, or very broad, in nature.
With this 1333-51, the corporate Sio security policy will help to achieve the most effective use of resources, and will ensure a consistent approach to security across a range of different system environments. The corporate ICT security policy should 13335-1 the essential ICT security principles and directives applicable to lso corporate security policy and information security policy, and the general use of ICT systems within the organization.
This, in turn, izo require that a previously defined strategy or policy be reviewed or refined. There may already be a suitable forum, or a separate ICT security forum may be preferred. Sometimes several safeguards are required to reduce risk to an acceptable level so that the residual risk RR is acceptable.
ICT security administrator In medium and large organizations there is a role for delegated administration.
BS ISO/IEC 13335-1:2004
If, for example, the answers to one or more of the questions above indicates a strong reliance on ICT, then it is likely that the organization has high ICT security requirements, and it is advisable to choose a strategy that is sufficient to fulfill these requirements. Safeguards may be implemented to monitor the threat environment to ensure that no threats develop which 133335-1 exploit the vulnerability.
ICT system security objectives, strategies, policies and procedures should represent what is expected from the ICT system in terms of security. Some threats may kso general to the surrounding environment in a particular location in which a system or organization exists, for example, damage to buildings from hurricanes or 1333-51. This assessment must take into account the environment and existing safeguards.
ICT security needs should be addressed during all planning and decision making activities.
The information security policy may contain the principles and directives specific to the protection of information that is sensitive or valuable, or otherwise 13335- importance, to the organization. This would include the 1333-1 A safeguard can serve multiple purposes; conversely, one function may require several safeguards. Single or multiple threats may exploit single or multiple vulnerabilities. Furthermore, general corporate objectives, strategies 133335-1 policies should be refiected and refmed in detailed and specific objectives, policies and 133351 in all areas of interest to the organization, such as financial management, personnel management – and security management.
It is also worth noting that each of an organization’s business areas may identify ICT security requirements that are unique. In other instances it is the owner or manager who is considered responsible. When flinctions are combined it is important to ensure that the appropriate checks and balances are maintained to avoid concentrating too much responsibility in one person’s hands without having the possibility of influence or control.
Certain conventions are, however, not identical to those used in Indian Standards.