Dealing with the most significant information risks first makes sense from the practical implementation and management perspectives. NIST standards are referenced in the bibliography. It does however imply a continual process consisting of a structured sequence of activities, some of which are iterative: Establish the risk management context e. Extensive appendices provide additional information, primarily examples to demonstrate the recommended approach.

Author:Goltijinn Juzshura
Language:English (Spanish)
Published (Last):25 August 2011
PDF File Size:17.96 Mb
ePub File Size:15.30 Mb
Price:Free* [*Free Regsitration Required]

Samugrel Consistency amongst the corresponding documents, although influenced by different points of view, and amongst the various levels of the organization, is important, since many threats such as system hacking, deletion and fire are common business problems.

Scenario 3 — Multiple safeguards may be effective in reducing the risks associated with multiple threats exploiting a vulnerability. R — risk RR — residual risk S — safeguard Iiso — threat V — vulnerability Figure 1 — Security element relationships Any ICT system comprises assets particularly information, but also hardware, software, communications services, etc.

Vulnerabilities may be qualified in terms such as High, Medium, and Low, depending on the outcome of the vulnerability assessment. ICT security needs should be addressed during all planning and decision making activities. With this alignment, the corporate ICT security policy will help to achieve the most effective use of resources, and will ensure a consistent approach to security across a range of different system environments. Search all products by.

Dependent on the ICT security objectives, a strategy for achieving these objectives should be agreed upon. The role of a corporate ICT security officer includes: Regardless of the documentation and organizational structure in use by the organization, it is important that the different messages of the policies described are addressed, and that consistency is maintained. Within a specific system or organization not vulnerabilities will be susceptible to a threat. This issue may have a considerable infiuence on the approach adopted.

Appropriate assignment and demarcation of accountability and specific roles and responsibilities ixo ensure that all important tasks are accomplished and that they are performed in an effective and efficient way.

We also use analytics. Safeguards may be implemented to monitor the threat environment to ensure that no threats develop isk can exploit the vulnerability.

These environmental, cultural and legal variations can be significant for international organizations and their use of ICT systems across international boundaries. As well, the environment changes over time and this change may impact the nature of threats and the probability of their occurrence. The directing documentation should reflect organizational requirements and take into account any organizational constraints.

Objectives, strategies and policies: Some threats may not be considered harmful in some cultures. This standard has been withdrawn. Threats may be qualified in terms such as High, Medium, and Low, depending on the outcome of threat assessment.

Both accidental and deliberate threats should be identified and their level and probability of occurrence assessed.

The role of such a forum or committee is to: The following sub-clauses describe at a high level the major security elements and their relationships that are involved in security management, in view of the fundamental security principles. Certain conventions are, however, not identical to those used in Indian Standards. These are normally known as ICT system security policies. Threats have characteristics that define their relationships with other security elements.

Copyright BIS has the copyright of all its publications. Any actual or perceived lack of such commitment will undermine the position of corporate ICT security officer and considerably weaken corporate defences to threats. Threats may exploit vulnerabilities to cause harm to the ICT system or business objectives.

Some threats may affect more than one Please download Chrome or Firefox io view our browser tips. ICT security project officer Lidividual projects or systems should have someone responsible for security, sometimes called the ICT security project officer.

The izo is a direct resource for the implementation of security management. Where appropriate, the corporate ICT security policy may be included in the range of corporate technical and management policies, which build a basis for a corporate ICT policy.


ISO/IEC Standard 13335



Popular Publishers



ISO/IEC 13335-1:2004


Related Articles