null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
67766
Security Mgt, ISO 27001, PDCA
Descripción
IYM001 Mapa Mental sobre Security Mgt, ISO 27001, PDCA, creado por jjanesko el 02/05/2013.
Sin etiquetas
iym001
iym001
Mapa Mental por
jjanesko
, actualizado hace más de 1 año
Más
Menos
Creado por
jjanesko
hace más de 11 años
270
22
0
Resumen del Recurso
Security Mgt, ISO 27001, PDCA
plan
establish ISMS
define policy
includes framework for setting objectives
takes into account requirements
business
regulatory
contractual
legal
aligns with strategic risk mgt context
establishes risk evaluation criteria
approved by management
define scope and boundaries based on
business characteristics
location
assets and technology
define risk assessment approach
define suitable methodology
define criteria for accepting risks
define acceptable risk levels
identify risks
1. identify assets & owners
2. identify threats
3. identify vulnerabilities
4. identify impacts of loss of confidentiality, integrity, availability on asses
analyze & evaluate risks
asess business impacts on organization from security failures
assess likelihood with respect to currently implemented controls
estimate the levels of risks
determine if risks are acceptable using criteria for accepting risk
identify options for risk treatment
controls
accept
avoid
transfer
select controls
obtain management approval of residual risk
prepare statement of applicability
documents control objectives, selected controls and reasoning
currently implemented control objectives and controls
any excluded ccontrol objectives and justification
do
implement and operate the ISMS
implement
policy
controls
processes
procedures
formulate risk treatment plan which identifies for risk management
management action
resources
responsibilities
priorities
implement selected controls
define how to measure and assess effectiveness
implement training and awareness programmes
manage ISMS operation
manage ISMS resources
implment procedures and controls capable of prompt detection of & response to security events
check
monitor and review the ISMS
execute monitoring & reviewing procedures to
detect erros in processing results
promptly identify security breaches
enable management security activites are performing as expected
activities assigned to people
activities implemented in IT
help detect and prevent security incidents by use of indicators
determine whether actions to resolve a breach were effective
undertake regular reviews of effectiveness
see results of security audits
incident logs
results from effectiveness measurements
suggestions and feedback from stakeholders
measure effectivness of controls that verify security requirements have been met
Review risk assessment at regular intervals, taking in account changes to
the organization
technology
business objectives and processes
identified threats
effectiveness of implemented controls
external evants such as regulatory changes
conduct internal audit
undertake regular management review of ISMS
update security plans based on monitoring and review
record actions and events that could have an impact on the effectiveness of the ISMS
act
maintain and improve the ISMS
implement identified improvements
take appropriate corrective and preventative actions
apply lessons learned from internal and external organizations
communicate actions and improvements to all interested parties
ensure improvements achieve their intended objectives
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
Exemplary Assignment Answers
jjanesko
Security Mgt, Flashcards for ISO 27000 series
jjanesko
Security Mgt U5, risk analysis and mgt (part 1)
jjanesko
Security Mgt U8, Information Assurance
jjanesko
Security Mgt U5, quantitative risk assessment forumula (image)
jjanesko
Security Mgt U5, risk analysis & mgt (part 2)
jjanesko
Security Mgt U8, Incident Recovery Image
jjanesko
Security Mgt U3, BS7799 (Part 2)
jjanesko
Security Mgt U3, BS7799 (Part 1)
jjanesko
Security Mgt U5, Risk Analysis Methods and Tools (image)
jjanesko
Security Mgt U10, Scope of Incident Response (chart)
jjanesko
Explorar la Librería