国际信息安全标准化概要.ppt

  1. 1、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。。
  2. 2、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  3. 3、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
国际信息安全标准化 ISO对“安全”理解 “the safety of a state, organization or individual and protection against threats such as criminal activity, terrorism, attack, or natural disaster.” security standards in this broad context. ISO的“安全”定义 The provision of protection against threats to people, physical assets, infrastructure, information and information technology assets including electronic networks and facilities, and to the movement of people and goods and related facilities. ISO已经关注的九个安全领域 o Training programmes and equipment for responders.(培训计划与器材) o Private sector emergency preparedness and business continuity.(私营部门的应急准备与业务连续性) o Identification techniques, including biometrics.(标识技术,含生物识别技术) o Emergency communications.(应急通信) o Inter-modal supply chain security.(联合运输供应链安全) o Risk assessment.(风险评估) o Biological and chemical threat agents.(生化威胁) o Cyber security.(信息网络安全) o Civil defence.(民防) ISO的评估 Standards play a number of important roles in supporting efforts to achieve security. For example, standards can be used to promulgate best practices and methodologies for security management. Standards can be used to specify test methods and parameters to aid in detection of threats. Standards can specify performance requirements to ensure equipment and systems provide the necessary performance and protection in extreme conditions. ISO的评估-1 Out of ISO’s 205 Technical Committees (including JTC1 subcommittees), 35 have deliverables related to security. Some of these are critical and fundamental to current global efforts to provide security and combat terrorism recently-developed standards for biometrics, detection of the illicit movement of nuclear material, maritime port security, and security of IT systems are noteworthy examples. ISO的评估-2 三个方面的确失: 没有适时将技术委员会的工作向安全领域延伸 共同经营者们需要“共同语言和框架”,以便对他们各不相同的系统实施安全管理 “自下而上”的相互隔离的视角,难以适应全球化、系统化的安全威胁,需要“TOP-DOWN”的、更战略的考虑。 ISO/JTC1-SC27的新结构 Working Group 1: Information security management systems Working Gro

文档评论(0)

糖糖 + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

1亿VIP精品文档

相关文档