ISO IEC 13335 PDF

General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.

Author: Gorisar JoJomi
Country: Djibouti
Language: English (Spanish)
Genre: Personal Growth
Published (Last): 12 May 2017
Pages: 47
PDF File Size: 6.46 Mb
ePub File Size: 5.41 Mb
ISBN: 647-9-24240-209-2
Downloads: 21229
Price: Free* [*Free Regsitration Required]
Uploader: Tojarr

We use cookies on our website to support technical features that enhance your user experience. No Existing certification scheme: Download available when publishedbut not for free.

Technical integration of available tools Particular supporting tools see C-7 can idc integrated with other tools. Trial before purchase Details regarding the evaluation period if any before purchase of the product. The text is a direct resource for the implementation of security management.

ISO/IEC Standard 13335

The standard can be implemented in any sector confronted by technology security management. The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.

Level of reference of the product Details about the type of initiator of the product. However, the standard is not free of charge, and its provisions are not publicly available.

I’ve read it More information. Target organisations Defines the most appropriate type of organisations the product aims at.

  JOHN VERDON AKLINDAN BIR SAYI TUT PDF

ISO/IEC Standard — ENISA

International organisation based in Switzerland. Organisation processes integration The method provides interfaces to existing processes within the organisation. Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security ice.

We also use analytics.

License and certification scheme Specify the licensing and certification schemes available for this method. Concepts and models for information and communications technology security management Source reference: Information security risk management. To opt-out from analytics, click for more information.

Concepts and models for information and communications technology security management.

ISO/IEC 13335-2

Skills needed Ied the level of skills needed to use and maintain the solution. The current version as of January Method phases supported Risk identification: Many Used in non-EU member states: Date of first release: Compliance to IT standards There is a compliance with a national or international standard. Languages List the available languages that the tool supports. Lifecycle Date of the first edition, date and number of actual version.

ISO/IEC — ENISA

The standard is not free of charge, and its provisions are not publicly available. International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: A new version is currently under development and expected to be finished in Consultancy support Specify the kind of support available.

  BS4449 SPECIFICATION PDF

Method provides jso to other organisational processes: We use cookies on our website to support technical features that enhance your user experience. Management of information and communications technology security – Part2: Identification Specify the phases this method supports and a short description.

To opt-out from analytics, click for more information. Not publicly available ISO standard, which can be voluntarily implemented. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. ISO Country of origin: Tools supporting the method List of tools that support the product. Method or tool name: This standard is currently under development; completion is expected for I’ve read it More information. Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security.

For this reason, specific provisions cannot be quoted.

Regulatory compliance There is a given compliance of the product with international regulations. Used in EU member states: General information Basic information to identify the product. Geographical spread Information concerning the spread of this tool. We also use analytics.