ISO IEC 13335 PDF

General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.

Author: Gum Taurg
Country: Sierra Leone
Language: English (Spanish)
Genre: Marketing
Published (Last): 8 February 2005
Pages: 72
PDF File Size: 17.7 Mb
ePub File Size: 3.91 Mb
ISBN: 961-8-69742-827-4
Downloads: 18303
Price: Free* [*Free Regsitration Required]
Uploader: Gajora

General information Basic information to identify the product. We also use analytics. The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.

Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools. ISO Country of origin: Method phases supported Risk identification: Trial before purchase Details regarding the evaluation period if any before purchase of the product.

Used in EU member states: To opt-out from analytics, click for more information. For this reason, specific provisions cannot be quoted. This standard is currently under development; completion is expected for Regulatory compliance There is a given compliance of the product with international regulations.

ISO/IEC Standard 13335

Level of reference of the product Details about the type of initiator of the product. Download available when publishedbut not for free. However, the standard is not free of charge, and its provisions are not publicly available.

  EVENTRACION POSTQUIRURGICA PDF

The standard can be implemented in any sector confronted by technology security management. Method provides interfaces to other organisational processes: The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls. Identification Specify the phases this method supports and a short description.

The current version as of January Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. Lifecycle Date of the first edition, date and number of actual version. Method or tool name: We also use analytics.

I’ve read it More information. Tools supporting the method List of tools that support the product. I’ve read it More information. Information security risk management. Concepts and models for information and communications technology security management.

Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security.

License and certification scheme Specify the licensing and certification schemes available for this method. Skills needed Specify the level of skills needed to use and maintain the solution.

Compliance to IT standards There is a compliance with a national or international standard. Languages List the available languages that the tool supports. Management of information isl communications technology security – Part2: No Existing certification scheme: Geographical spread Information concerning the spread of this tool.

  JAMES BURNHAM THE MACHIAVELLIANS PDF

We use cookies on our website to support technical features that enhance your user experience.

ISO/IEC Standard — ENISA

Organisation processes integration The method provides interfaces to existing processes within the organisation. A new version is currently under development and expected to be finished in We use cookies on our website to support technical features that enhance your user experience.

Concepts and models for information and communications technology security management Source reference: Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. The text is a direct resource ic the implementation of security management. Date of first release: The standard is not free of charge, and its provisions are not publicly available.

Not publicly available ISO standard, which can be voluntarily implemented. To opt-out from analytics, click for more information.