Unlock the full potential of your projects.
Try MeisterTask for free.
¿No tienes una cuenta?
Regístrate Gratis
Navegar
Mapas Destacados
Categorías
Gestión de proyectos
Objetivos de negocio
Recursos humanos
Lluvia de ideas y análisis
Marketing y contenido
Educación y notas
Entretenimento
Vida
Tecnología
Diseño
Resúmenes
Otros
Idiomas
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Otros
Ver mapa completo
Copiar y editar mapa
Copiar
Fundamentals of Information Security Management Systems
Otros
Rafael Campos
Seguir
Comienza Ya.
Es Gratis
Regístrate con Google
ó
regístrate
con tu dirección de correo electrónico
Mapas Mentales Similares
Esbozo del Mapa Mental
Fundamentals of Information Security Management Systems
por
Rafael Campos
1. Part-I : Overview of ISO/IEC 27001:2013
1.1. 1.1 - What is ISO/IEC 27001:2013?
1.2. 1.2 - What are the benefits of ISO27001 implementation?
1.3. 1.3 - Who are the ISO27001:2013 Certification Bodies?
1.4. Exercise
2. Part-II : Information Security Management (ISM) Terminology
2.1. 2.1 - Asset
2.2. 2.2 - Availability
2.3. 2.3 - Confidentiality
2.4. 2.4 - Control
2.5. 2.5 - Guideline
2.6. 2.6 - Information Processing Facilities
2.7. 2.7 - Information Security
2.8. 2.8 - Information Security Event
2.9. 2.9 - Information Security Incident
2.10. 2.10 - Information Security Management System (ISMS)
2.11. 2.11 - Integrity
2.12. 2.12 - Policy
2.13. 2.13 - Residual Risk
2.14. 2.14 - Risk
2.15. 2.15 - Statement of Applicability
2.16. Exercise
3. Part-III : Details of ISO/IEC 27001:2013 Standard
3.1. 3.1 - Introduction
3.2. 3.2 - Scope
3.3. 3.3 - Normative References
3.4. 3.4 - Terms and Definitions
3.5. 3.5 - Context of the Organization
3.6. 3.6 - Leadership
3.7. 3.7 - Planning
3.8. 3.8 - Support
3.9. 3.9 - Operation
3.10. 3.10 - Performance Evaluation
3.11. 3.11 - Improvement
3.12. Exercise
4. Part-IV : Control Objectives and Controls
4.1. 4.1 - Information Security Policies
4.2. 4.2 - Organization of Information Security
4.3. 4.3 - Human Resources Security
4.4. 4.4 - Asset management
4.5. 4.5 - Access control
4.6. 4.6 - Cryptography
4.7. 4.7 - Physical and environmental security
4.8. 4.8 - Operations security
4.9. 4.9 - Communications security
4.10. 4.10 - System acquisition, development and maintenance
4.11. 4.11 - Supplier relationships
4.12. 4.12 - Information security incident management
4.13. Exercise
Comienza Ya. ¡Es Gratis!
Conéctate con Google
ó
Regístrate