null
US
Entrar
Registre-se gratuitamente
Registre-se
Detectamos que o JavaScript não está habilitado no teu navegador. Habilite o Javascript para o funcionamento correto do nosso site. Por favor, leia os
Termos e Condições
para mais informações.
Próximo
Copiar e Editar
Você deve estar logado para concluir esta ação!
Inscreva-se gratuitamente
67766
Security Mgt, ISO 27001, PDCA
Descrição
IYM001 Mapa Mental sobre Security Mgt, ISO 27001, PDCA, criado por jjanesko em 02-05-2013.
Sem etiquetas
iym001
iym001
Mapa Mental por
jjanesko
, atualizado more than 1 year ago
Mais
Menos
Criado por
jjanesko
mais de 11 anos atrás
270
22
0
Resumo de Recurso
Security Mgt, ISO 27001, PDCA
plan
establish ISMS
define policy
includes framework for setting objectives
takes into account requirements
business
regulatory
contractual
legal
aligns with strategic risk mgt context
establishes risk evaluation criteria
approved by management
define scope and boundaries based on
business characteristics
location
assets and technology
define risk assessment approach
define suitable methodology
define criteria for accepting risks
define acceptable risk levels
identify risks
1. identify assets & owners
2. identify threats
3. identify vulnerabilities
4. identify impacts of loss of confidentiality, integrity, availability on asses
analyze & evaluate risks
asess business impacts on organization from security failures
assess likelihood with respect to currently implemented controls
estimate the levels of risks
determine if risks are acceptable using criteria for accepting risk
identify options for risk treatment
controls
accept
avoid
transfer
select controls
obtain management approval of residual risk
prepare statement of applicability
documents control objectives, selected controls and reasoning
currently implemented control objectives and controls
any excluded ccontrol objectives and justification
do
implement and operate the ISMS
implement
policy
controls
processes
procedures
formulate risk treatment plan which identifies for risk management
management action
resources
responsibilities
priorities
implement selected controls
define how to measure and assess effectiveness
implement training and awareness programmes
manage ISMS operation
manage ISMS resources
implment procedures and controls capable of prompt detection of & response to security events
check
monitor and review the ISMS
execute monitoring & reviewing procedures to
detect erros in processing results
promptly identify security breaches
enable management security activites are performing as expected
activities assigned to people
activities implemented in IT
help detect and prevent security incidents by use of indicators
determine whether actions to resolve a breach were effective
undertake regular reviews of effectiveness
see results of security audits
incident logs
results from effectiveness measurements
suggestions and feedback from stakeholders
measure effectivness of controls that verify security requirements have been met
Review risk assessment at regular intervals, taking in account changes to
the organization
technology
business objectives and processes
identified threats
effectiveness of implemented controls
external evants such as regulatory changes
conduct internal audit
undertake regular management review of ISMS
update security plans based on monitoring and review
record actions and events that could have an impact on the effectiveness of the ISMS
act
maintain and improve the ISMS
implement identified improvements
take appropriate corrective and preventative actions
apply lessons learned from internal and external organizations
communicate actions and improvements to all interested parties
ensure improvements achieve their intended objectives
Quer criar seus próprios
Mapas Mentais
gratuitos
com a GoConqr?
Saiba mais
.
Semelhante
Exemplary Assignment Answers
jjanesko
Security Mgt, Flashcards for ISO 27000 series
jjanesko
Security Mgt U5, risk analysis and mgt (part 1)
jjanesko
Security Mgt U8, Information Assurance
jjanesko
Security Mgt U5, quantitative risk assessment forumula (image)
jjanesko
Security Mgt U5, risk analysis & mgt (part 2)
jjanesko
Security Mgt U8, Incident Recovery Image
jjanesko
Security Mgt U3, BS7799 (Part 2)
jjanesko
Security Mgt U3, BS7799 (Part 1)
jjanesko
Security Mgt U5, Risk Analysis Methods and Tools (image)
jjanesko
Security Mgt U10, Scope of Incident Response (chart)
jjanesko
Explore a Biblioteca