ISO IEC 13335 PDF

General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.

Author: Mezitaxe Juzahn
Country: Eritrea
Language: English (Spanish)
Genre: Love
Published (Last): 6 March 2005
Pages: 396
PDF File Size: 4.78 Mb
ePub File Size: 9.54 Mb
ISBN: 815-6-39918-967-5
Downloads: 50960
Price: Free* [*Free Regsitration Required]
Uploader: Fenrimi

Languages List the available languages that the tool supports.

Lifecycle Date of the first edition, date and number of actual version. We use cookies on our website to support technical features that enhance your user experience. Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security. The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices. No Existing certification scheme: The text is a direct resource for the implementation of security management.

Method phases supported Risk identification: We use cookies on our website to support technical features that enhance your user experience. Geographical spread Information concerning ieo spread of this tool. Identification Specify the phases this method supports and a short description. ISO Country of origin: Used in EU member states: Organisation processes integration The method provides interfaces to existing processes within the organisation.

  A CORPSE IN THE KORYO PDF

We also use analytics.

ISO/IEC Standard 13335

General information Basic information to identify the product. Method or tool name: 133335 available when publishedbut not for free. The standard can be implemented in any sector confronted by technology security management.

Not publicly available Ixo standard, which can be voluntarily implemented. The current version as of January The standard is not free of charge, and its provisions are not publicly available.

This standard is currently under development; completion is expected for License and certification scheme Specify the licensing and certification schemes available for this method.

Target organisations Defines ic most appropriate type of organisations the product aims at. Date of first release: Compliance to IT standards There is a compliance with a national or international standard.

ISO/IEC — ENISA

Information security risk management. However, the standard is not free of charge, and its provisions are not publicly available.

Concepts and models for information and communications technology security management. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. Consultancy support Specify the kind of support available. Method provides interfaces to other organisational processes: Standard containing generally accepted descriptions of concepts and models for information and communications technology security management.

  MANIOBRA DE RITGEN PDF

Trial before purchase Details regarding the evaluation period if any before purchase of the product. Level of reference of the product Details about the type of initiator of the product.

Many Used in non-EU member states: We also use analytics.

ISO/IEC Standard — ENISA

Concepts and models for information and communications technology security management Source reference: International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: Regulatory compliance There is a given compliance of the product with international regulations.

For this reason, specific provisions cannot be quoted. Tools supporting the method List of tools that support the product. Management of information and communications technology security – Part2: The annexes contain examples of information lso Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.

A new version is currently under development and expected to be irc in