Unlock the full potential of your projects.
Try MeisterTask for free.
Heb je nog geen account?
Meld je Gratis aan
Browse
Aanbevolen kaarten
Rubrieken
Project management
Zakelijke doelen
Personeelszaken
Brainstormen en analyseren
Marketing & Inhoud
Onderwijs en notities
Entertainment
Leven
Technologie
Ontwerp
Samenvattingen
Andere
Talen
English
Deutsch
Français
Español
Português
Nederlands
Dansk
Русский
日本語
Italiano
简体中文
한국어
Andere
Toon volledige map
Kopieer en bewerk map
Kopieer
Fundamentals of Information Security Management Systems
Andere
Rafael Campos
Volg
Laten we beginnen.
Het is Gratis
Login met Google
of
registreren
met je e-mailadres
Vergelijkbare mind mappen
Overzicht van map
Fundamentals of Information Security Management Systems
Door
Rafael Campos
1. Part-I : Overview of ISO/IEC 27001:2013
1.1. 1.1 - What is ISO/IEC 27001:2013?
1.2. 1.2 - What are the benefits of ISO27001 implementation?
1.3. 1.3 - Who are the ISO27001:2013 Certification Bodies?
1.4. Exercise
2. Part-II : Information Security Management (ISM) Terminology
2.1. 2.1 - Asset
2.2. 2.2 - Availability
2.3. 2.3 - Confidentiality
2.4. 2.4 - Control
2.5. 2.5 - Guideline
2.6. 2.6 - Information Processing Facilities
2.7. 2.7 - Information Security
2.8. 2.8 - Information Security Event
2.9. 2.9 - Information Security Incident
2.10. 2.10 - Information Security Management System (ISMS)
2.11. 2.11 - Integrity
2.12. 2.12 - Policy
2.13. 2.13 - Residual Risk
2.14. 2.14 - Risk
2.15. 2.15 - Statement of Applicability
2.16. Exercise
3. Part-III : Details of ISO/IEC 27001:2013 Standard
3.1. 3.1 - Introduction
3.2. 3.2 - Scope
3.3. 3.3 - Normative References
3.4. 3.4 - Terms and Definitions
3.5. 3.5 - Context of the Organization
3.6. 3.6 - Leadership
3.7. 3.7 - Planning
3.8. 3.8 - Support
3.9. 3.9 - Operation
3.10. 3.10 - Performance Evaluation
3.11. 3.11 - Improvement
3.12. Exercise
4. Part-IV : Control Objectives and Controls
4.1. 4.1 - Information Security Policies
4.2. 4.2 - Organization of Information Security
4.3. 4.3 - Human Resources Security
4.4. 4.4 - Asset management
4.5. 4.5 - Access control
4.6. 4.6 - Cryptography
4.7. 4.7 - Physical and environmental security
4.8. 4.8 - Operations security
4.9. 4.9 - Communications security
4.10. 4.10 - System acquisition, development and maintenance
4.11. 4.11 - Supplier relationships
4.12. 4.12 - Information security incident management
4.13. Exercise
Begin. Het is gratis!
Verbind met Google
of
Registreren