logo

INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT

   

Added on  2022-11-29

4 Pages390 Words1 Views
Running head: INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
Name of the Student
Name of the Organization
Author Note
INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT_1
INFORMATION SECURITY MANAGEMENT
1
Aspects of InfoSec standard to be followed by the organization:
ISO 27001- This is an international standard for all the information security systems of
management which are best practiced. It is a kind of very much comprehensive specification
for both the preservation as well as the protection of the information under all the various
principles involving availability as well as confidentiality (Disterer 2013). It will be offering
all the various controls to the organization based upon all the various risks and it will be
implemented in such a manner such that a certified compliance can be achieved. A proper
guidance will be provided related to the cyber security.
ISO 27032- This is the international standard which will be explicitly focusing upon the
cyber security. This standard is capable of recognising all the various vectors which several
cyber-attacks will be relying upon involving all of those which will be originating outside of
the cyber space.
ISO 27035- This specific standard involves all the various guidelines for the update of
various processes as well as policies for the purpose of strengthening all the various controls
which have been exiting following the specific analysis of any event and then there will be
the minimization of the recurrence risk.
ISO 27031- This international standard is mainly for the continuity of any business (Peltier
2016). This particular standard acts like a bridge in between any specific incident itself and
the continuity of any business and it finally forms a connection in the specific chain of the
cyber resilience.
ISO 22301- This particular international standard will not only be focusing upon the recovery
from all the various disasters but also for the proper maintenance of the access and the
security of the information which is very much essential whenever attempt will be made for
securing the functionality.
INFORMATION SECURITY MANAGEMENT INFORMATION SECURITY MANAGEMENT_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Importance of Cyber Security Risk Management in E-commerce Companies
|4
|729
|432

Information Assurance - Part C: Action Required for Compliance with ISO 27001 Security Standard
|9
|1815
|465

Information Security Management : Assignment
|17
|4332
|251

Security: Protecting Information Systems and Data
|14
|2209
|498

Cyber-Security Framework Differences - PDF
|9
|1340
|112

Information Security Management: Guidelines for Risk Management and Certification
|14
|3312
|209