Frigør det fulde potentiale i dine projekter.
Prøv MeisterTask gratis.
Har du ingen konto?
Tilmeld dig Gratis
Brows
Fremhævede Maps
Kategorier
Projektledelse
Forretning og mål
Menneskelige ressourcer
Brainstorming & Analyse
Marketing & Indhold
Uddannelse og noter
Underholdning
Fritid
Teknologi
Design
Opsummeringer
Andre
Sprog
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andet
Vis hele kortet
Kopier og rediger map
Kopier
Fundamentals of Information Security Management Systems
Andre
Rafael Campos
Følg
Kom i gang.
Det er Gratis
Tilmeld dig via Google
eller
tilmeld
med din email adresse
Lignende mindmaps
Mindmap-oversigt
Fundamentals of Information Security Management Systems
af
Rafael Campos
1. Part-I : Overview of ISO/IEC 27001:2013
1.1. 1.1 - What is ISO/IEC 27001:2013?
1.2. 1.2 - What are the benefits of ISO27001 implementation?
1.3. 1.3 - Who are the ISO27001:2013 Certification Bodies?
1.4. Exercise
2. Part-II : Information Security Management (ISM) Terminology
2.1. 2.1 - Asset
2.2. 2.2 - Availability
2.3. 2.3 - Confidentiality
2.4. 2.4 - Control
2.5. 2.5 - Guideline
2.6. 2.6 - Information Processing Facilities
2.7. 2.7 - Information Security
2.8. 2.8 - Information Security Event
2.9. 2.9 - Information Security Incident
2.10. 2.10 - Information Security Management System (ISMS)
2.11. 2.11 - Integrity
2.12. 2.12 - Policy
2.13. 2.13 - Residual Risk
2.14. 2.14 - Risk
2.15. 2.15 - Statement of Applicability
2.16. Exercise
3. Part-III : Details of ISO/IEC 27001:2013 Standard
3.1. 3.1 - Introduction
3.2. 3.2 - Scope
3.3. 3.3 - Normative References
3.4. 3.4 - Terms and Definitions
3.5. 3.5 - Context of the Organization
3.6. 3.6 - Leadership
3.7. 3.7 - Planning
3.8. 3.8 - Support
3.9. 3.9 - Operation
3.10. 3.10 - Performance Evaluation
3.11. 3.11 - Improvement
3.12. Exercise
4. Part-IV : Control Objectives and Controls
4.1. 4.1 - Information Security Policies
4.2. 4.2 - Organization of Information Security
4.3. 4.3 - Human Resources Security
4.4. 4.4 - Asset management
4.5. 4.5 - Access control
4.6. 4.6 - Cryptography
4.7. 4.7 - Physical and environmental security
4.8. 4.8 - Operations security
4.9. 4.9 - Communications security
4.10. 4.10 - System acquisition, development and maintenance
4.11. 4.11 - Supplier relationships
4.12. 4.12 - Information security incident management
4.13. Exercise
Kom i gang. Det er gratis!
Forbind med Google
eller
Tilmeld