Relationship

ISO IEC 13335 PDF

General information. Basic information to identify the product. Method or tool name: ISO/IEC Management of information and communications. ISO/IEC INTERNATIONAL. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management. STANDARD. ISO/IEC. First edition. Information technology — Security techniques — Management of information and communications.

Author: Taura Gugrel
Country: Syria
Language: English (Spanish)
Genre: Photos
Published (Last): 28 July 2010
Pages: 118
PDF File Size: 3.54 Mb
ePub File Size: 20.33 Mb
ISBN: 156-3-35392-889-3
Downloads: 80736
Price: Free* [*Free Regsitration Required]
Uploader: Musar

Many Used in non-EU member states: Method phases supported Risk identification: Technical integration of available tools Particular supporting tools see C-7 can be integrated with other tools. The standard is not free of charge, and its oso are not publicly available.

Maturity level of the Information system The product gives a means of measurement for the maturity of the information system security. To opt-out from analytics, click for more information.

ISO/IEC Standard — ENISA

However, the standard is not free of charge, and its provisions are not iiec available. Trial before purchase Details regarding the evaluation period if any before purchase of the product. I’ve read it More information.

Standard containing generally accepted descriptions of concepts and models for information and communications technology security management. We use cookies on our website to support technical features that enhance your user experience. To opt-out from analytics, click for more information.

  BULA MERCILON CONTI PDF

Geographical spread Information concerning the spread of this tool. A new version is currently under development and expected iao be finished in Target organisations Defines the most appropriate type of organisations the product aims at.

No Existing certification scheme: International organisation based in Switzerland Level of reference of the product Details about the type of initiator of the product International Standardization body: Concepts and models for information and communications technology security management Source reference: Lifecycle Date of the first edition, date and number of actual version. The text is a direct resource for the implementation of security management.

ISO Country kec origin: The izo is a commonly used code of practice, and serves as a resource for the implementation of security management practices and as a yardstick for auditing such practices.

General information Uso information to identify the product. Method or tool name: This standard is currently under development; completion is expected for We also use analytics. Used in EU member states: For this reason, specific provisions cannot be quoted.

ISO/IEC — ENISA

The standard can be implemented in any sector confronted by technology security management. Compliance to IT standards There is a compliance with a national or international standard. Skills needed Specify the level of skills needed to use and maintain the ios. Organisation processes integration The method provides interfaces to existing processes within the organisation.

  JPEG STILL IMAGE DATA COMPRESSION STANDARD PENNEBAKER PDF

The current version as of January Regulatory compliance There is a given compliance of the product with international regulations.

ISO/IEC Standard 13335

International organisation based in Switzerland. Information security risk management. Flexible knowledge databases It is possible to adapt a knowledge database specific to the activity domain of the company. We use cookies on our website to support technical features that enhance your user experience. Identification Specify the phases this method supports and a short description.

Level of reference of the product Details about the type of initiator of the product. Download available when publishedbut not for free.

Not publicly available ISO standard, which can be voluntarily implemented. Date of first release: License and certification scheme Specify the licensing and certification schemes available for this method.

Languages List the available languages that the tool supports. Tools supporting the method List of tools that support the product.

Concepts and models for information and communications technology security management.