asked on
ASKER
ASKER
Security is the protection of information systems from theft or damage to the hardware, the software, and the information on them, as well as from disruption or misdirection of the services they provide. The main goal of security is protecting assets, and an asset is anything of value and worthy of protection. Information Security is a discipline of protecting information assets from threats through safeguards to achieve the objectives of confidentiality, integrity, and availability or CIA for short. On the other hand, disclosure, alteration, and disruption (DAD) compromise the security objectives.
TRUSTED BY
a) 4 ISMS Requirements
b) 5 Mgmt Responsibilities
c) 6 Internal ISMS Audits
d) 7 Mgmt Review of ISMS
e) 8 ISMS Improvement
f) Annex A: Control Objectives and Controls
• A5 Security Policy
• A6 Organisation of Information Security
• A7 Asset Mgmt
• A8 Human Resource Security
• A9 Physical & Environmental Security
• A10 Communications & Operations Mgmt
• A11 Access Control
• A12 Information System Acquisition, Development & Maintenance
• A13 Information Security Incident Mgmt
• A14 Business Continuity Mgmt
• A15 Compliance
Below has description of the various and 27001 and 27002 can be the main focus
http://www.iso27001security.com/html/iso27000.html
this toolkit comes in handy too e.g. ISMS implementation and certification process flowchart, ISMS implementation plan, Case study on ISMS implementation, Controls cross-check and more @ http://www.iso27001security.com/html/iso27k_toolkit.html
I also attached a summary checklist for info.
Note that information security is not the same as computer security. All information assets need to be secured appropriately, including hardcopy documents, CCTV/videoconference data, telephone systems etc. as well as computer data, systems and networks. Getting the RiskAssessment right is crucial to the success of implementation. The structure of the risk assessment is clearly outlined in ISO27001 and should be followed very closely.
E.g. http://iso-17799.safemode.org/index.php?page=RiskAssessment