In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-01-14 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Internet Technology >
Share
Shulou(Shulou.com)06/02 Report--
I would like to share with you what the objects of information security management are. I believe most people don't know much about it, so share this article for your reference. I hope you will gain a lot after reading this article. Let's learn about it together.
The objects of information security management include objectives, rules, organizations and people. Information security management system is a system in which an organization establishes information security policies and objectives as a whole or within a specific scope, as well as the methods used to achieve these goals. it is the result of direct management activities.
The objects of information security management include objectives, rules, organizations and personnel.
Information security management system is a system in which an organization establishes information security policies and objectives as a whole or within a specific scope, as well as the methods used to achieve these goals. It is the result of direct management activities and is expressed as a collection of elements such as policies, principles, objectives, methods, processes, checklists (Checklists), etc.
Information Security Management system (Information Security Management System, referred to as ISMS) is a new concept in the field of information security developed from the United Kingdom around 1998. It is the application of management system (Management System,MS) ideas and methods in the field of information security. In recent years, with the revision of ISMS international standards, ISMS has been rapidly accepted and recognized all over the world, and has become an effective way for organizations of all countries, types and sizes to solve information security problems. ISMS certification has become an effective way for organizations to prove their information security level and ability to the society and its related parties.
The information security management system is a working system for organizations to formulate information security management policies and strategies in accordance with the requirements of the relevant standards of the information security management system, and to adopt the method of risk management to carry out information security management planning, implementation, review and inspection, and improve the implementation of information security management. The information security management system is established in accordance with the requirements of ISO/IEC 27001 standard "Information Technology Security Technology Information Security Management system requirements". ISO/IEC 27001 standard is developed from BS7799-2 standard.
Information security management system (ISMS) is the standard for establishing and maintaining an information security management system. The standard requires organizations to establish an information security management system through activities such as determining the scope of the information security management system, formulating information security policies, defining management responsibilities, and selecting control objectives and control methods based on risk assessment. Once the system is established, the organization should operate in accordance with the requirements of the system and maintain the effectiveness of the operation of the system. The information security management system should form certain documents, that is, the organization should establish and maintain a documented information security management system, in which the protected assets, organizational risk management methods, control objectives and control methods and the degree of assurance needed should be described.
The above is all the contents of the article "what are the objects of Information Security Management". Thank you for reading! I believe we all have a certain understanding, hope to share the content to help you, if you want to learn more knowledge, welcome to follow the industry information channel!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.