General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.

Author: Mitaur Tuzahn
Country: Bahrain
Language: English (Spanish)
Genre: Art
Published (Last): 20 January 2008
Pages: 331
PDF File Size: 20.38 Mb
ePub File Size: 11.3 Mb
ISBN: 252-7-66234-846-8
Downloads: 92474
Price: Free* [*Free Regsitration Required]
Uploader: Shaktit

ISO Country of origin: The text is a direct resource for the implementation of security management. Maturity level of the Information 13335 The product gives a means of measurement for the maturity of the information system security.

ISO/IEC 13335-2

Skills needed Specify the level of skills needed to use and maintain the solution. A new version is currently under development and expected to be finished in However, the standard is not free of charge, and its provisions are not publicly available.

Method or tool name: To opt-out from analytics, click for more information. No Existing certification scheme: To opt-out from analytics, click for more information. Method phases supported Risk identification: Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools.

Many Used in non-EU member states: Information security risk management.

ISO/IEC Standard — ENISA

Languages List the available languages that the tool supports. I’ve read it More information.

  INDICACIONES Y CONTRAINDICACIONES DE LA TERMOTERAPIA PDF

The standard is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices. Consultancy support Specify the kind of support available.

ISO/IEC Standard 13335

I’ve read it More information. Not publicly available ISO standard, which can be voluntarily implemented. The current version as of January The standard can be implemented in any sector confronted by technology security management.

Method provides interfaces to other organisational processes: Identification Specify the phases this method supports and a 1335 description.

Organisation processes integration The method provides interfaces to existing processes within the organisation. Regulatory compliance There is a given compliance of the product with international regulations. The annexes contain examples of information security Risk Assessment approaches as well as lists of possible threats, vulnerabilities and security controls.

International organisation based in Switzerland. Concepts and models for information and communications technology security management.

ISO/IEC — ENISA

Compliance to IT standards There is a compliance with a national or international standard. Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. Used in EU member states: Date of first release: Level of reference of the product Details about the type of initiator of the product.

International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: Trial before purchase Details regarding the evaluation period if any before purchase of the product.

  LEYES DE LA SIMPLICIDAD MAEDA PDF

We use cookies on our website to support technical features that enhance your user experience. Download available when publishedbut not for free.

This standard is currently under development; completion is expected for We also use analytics. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. Concepts and models for information and communications technology security management Source reference: The standard is not free of charge, and its provisions are not publicly available. Geographical spread Information concerning the spread of this tool.

For this reason, specific provisions cannot be quoted. Tools supporting the method List of tools that support the product. Management of information and communications technology security – Part2: Target organisations Defines the most appropriate type of organisations the product aims at. We use cookies on our website to support technical features that enhance your user experience.

We also use analytics. Lifecycle Date of the first edition, date and number of actual version. License and certification scheme Specify the licensing and certification schemes available for this method. General information Basic information to identify the product.