Information technology — Security techniques — Code of practice for information security management
Số trang: 130
Loại file: pdf
Dung lượng: 2.72 MB
Lượt xem: 10
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
ISO (the International Organization for Standardization) and IEC (the International ElectrotechnicalCommission) form the specialized system for worldwide standardization. National bodies that aremembers of ISO or IEC participate in the development of International Standards through technicalcommittees established by the respective organization to deal with particular fields of technicalactivity. ISO and IEC technical committees collaborate in fields of mutual interest. Other internationalorganizations, governmental and non-governmental, in liaison with ISO and IEC, also take part in thework. In the field of information technology, ISO and IEC have established a joint technicalcommittee, ISO/IEC JTC 1....
Nội dung trích xuất từ tài liệu:
Information technology — Security techniques — Code of practice for information security management BRITISH STANDARD BS ISO/IEC 17799:2005 BS 7799-1:2005 Information technology — Security techniques — Code of practice forLicensed to: Alexis Dobrolski, 06/09/2006 04:24:33 GMT, © BSI, eShop.bsi-global.com information security management ICS 35.040 12 &23 BS ISO/IEC 17799:2005 National foreword This British Standard reproduces verbatim ISO/IEC 17799:2005 and implements it as the UK national standard. It supersedes BS ISO/IEC 17799:2000 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33, Information technology — Security Techniques, which has the responsibility to: — aid enquirers to understand the text; — present to the responsible international/European committee any enquiries on the interpretation, or proposals for change, and keep the UK interests informed; — monitor related international and European developments andLicensed to: Alexis Dobrolski, 06/09/2006 04:24:33 GMT, © BSI, eShop.bsi-global.com promulgate them in the UK. A list of organizations represented on this committee can be obtained on request to its secretary. Cross-references The British Standards which implement international publications referred to in this document may be found in the BSI Catalogue under the section entitled “International Standards Correspondence Index”, o ...
Nội dung trích xuất từ tài liệu:
Information technology — Security techniques — Code of practice for information security management BRITISH STANDARD BS ISO/IEC 17799:2005 BS 7799-1:2005 Information technology — Security techniques — Code of practice forLicensed to: Alexis Dobrolski, 06/09/2006 04:24:33 GMT, © BSI, eShop.bsi-global.com information security management ICS 35.040 12 &23 BS ISO/IEC 17799:2005 National foreword This British Standard reproduces verbatim ISO/IEC 17799:2005 and implements it as the UK national standard. It supersedes BS ISO/IEC 17799:2000 which is withdrawn. The UK participation in its preparation was entrusted to Technical Committee IST/33, Information technology — Security Techniques, which has the responsibility to: — aid enquirers to understand the text; — present to the responsible international/European committee any enquiries on the interpretation, or proposals for change, and keep the UK interests informed; — monitor related international and European developments andLicensed to: Alexis Dobrolski, 06/09/2006 04:24:33 GMT, © BSI, eShop.bsi-global.com promulgate them in the UK. A list of organizations represented on this committee can be obtained on request to its secretary. Cross-references The British Standards which implement international publications referred to in this document may be found in the BSI Catalogue under the section entitled “International Standards Correspondence Index”, o ...
Tìm kiếm theo từ khóa liên quan:
information security Confidentiality agreements EXTERNAL PARTIES Information labeling Termination responsibilities Public access deliveryGợi ý tài liệu liên quan:
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 278 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 49 0 0 -
Speeding up data processing on firewall using FPGA
10 trang 36 0 0 -
Ebook PGP & GPG email for the practical paranoid
216 trang 34 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 2
193 trang 34 0 0 -
Ebook The InfoSec handbook: An introduction to Information security - Part 1
183 trang 33 0 0 -
Lecture Professional Practices in IT: Lecture 29
12 trang 32 0 0 -
Ebook Principles of information security (Fifth Edition): Part 1
326 trang 31 0 0 -
Seminars in IT for Businesses - Lecture 25: Ethic & information security issues (Part 2)
44 trang 29 0 0 -
20 trang 29 0 0