ISO IEC 13335 PDF

General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.

Author: Yozshulkree Bragal
Country: Grenada
Language: English (Spanish)
Genre: Automotive
Published (Last): 17 March 2018
Pages: 425
PDF File Size: 15.46 Mb
ePub File Size: 3.63 Mb
ISBN: 720-8-67571-964-1
Downloads: 13995
Price: Free* [*Free Regsitration Required]
Uploader: JoJolrajas

Information security risk management.

To opt-out from analytics, click for more information. Lifecycle Date of the first edition, date and number of actual version.

We also use analytics. Date of first release: Method or tool name: To opt-out from analytics, click for more information. Flexible knowledge databases It is possible 13335 adapt a knowledge database specific to the activity domain of the company.

A new version is currently under development and expected to be finished in Concepts and models for information and communications technology security management Source reference: Method provides interfaces to other organisational processes: Skills needed Specify the level of skills needed to use and maintain the solution.

Regulatory compliance There is a given compliance of the product with international regulations. We use cookies on our website to support technical features that enhance your user experience. The current version as of January Download available when publishedbut not for free.

  GUITARRA SOLISTA FREDERICK NOAD PDF

ISO Country of origin: Used in EU member states: International organisation based in Switzerland. Compliance to IT standards There is a compliance with a national or international standard. Organisation processes integration The method provides interfaces to existing processes within the organisation.

Concepts and models for information and communications technology security management. The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.

ISO/IEC Standard — ENISA

We use iao on our website to support technical features that enhance your user experience. Geographical spread Information concerning the spread of this tool.

We also use analytics. For this reason, specific provisions cannot be quoted.

ISO/IEC Standard 13335

The standard can be implemented in any sector confronted by technology security management. Level of reference of the product Details about the type of initiator of the product. Consultancy support Specify the 133335 of support available.

Not publicly available ISO standard, which can be voluntarily implemented. However, the standard is not free of charge, and its provisions are not publicly available. General information Basic information to identify the product.

ISO/IEC 13335-2

The text is a direct resource for the implementation of security eic. Method phases supported Risk identification: International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: No Existing certification scheme: This standard is currently under development; completion is expected for Languages List the available languages that the tool supports.

  COMPUNEREA VECTORILOR PDF

Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools. The standard is not free of charge, and its provisions are not 13353 available. Trial before purchase Details regarding the evaluation period if any before purchase of the product. Many Used in non-EU member states: The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.

Identification Specify the phases this method supports and a short jso. Management of information and communications technology security – Part2: I’ve read it More information. Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security.

License and certification scheme Specify the licensing and certification schemes available for this method. Tools supporting the method List of tools that support the product.