- 1、本文档被系统程序自动判定探测到侵权嫌疑,本站暂时做下架处理。
- 2、如果您确认为侵权,可联系本站左侧在线QQ客服请求删除。我们会保证在24小时内做出处理,应急电话:400-050-0827。
- 3、此文档由网友上传,因疑似侵权的原因,本站不提供该文档下载,只提供部分内容试读。如果您是出版社/作者,看到后可认领文档,您也可以联系本站进行批量认领。
查看更多
ISO17799
N ovembe r /Decembe r 2006 ? T he I n f o r ma t i o n Managemen t J ou r na l 43
retexting. Zero Day Attacks. SQL Injections. Bots and Botnets. Insider
Infractions. Click Fraud. Database Hacking. Identity Theft. Lost Laptops
and Handhelds. According to Ted Humphreys, in a recent International
Organization for Standardization (ISO) press release, “It is estimated that
intentional attacks on information systems are costing businesses world-
wide around $15 billion each year and the cost is rising.”
Today’s information professionals need to address an ever-increasing number of
internal and external threats to their systems’ stability and security, while maintaining
access to critical information systems. As the e-commerce space continues to grow and
new tools allow organizations to conduct more business online, they must have controls
in place to curtail cyber crimes’ malicious mayhem, tampering, and wrongdoing.
Organizations need to address information security from legal, operational, and
compliance perspectives. The risk of improper use and inadequate documentation
abounds, and the penalties are greater than ever. By combining best practices outlined
in the international standard ISO/IEC 17799 Information Technology – Security
Techniques – Code of Practice for Information Security Management (ISO 17799) with
electronic records management processes and principles, organizations can address
their legal and compliance objectives. This article explores the opportunity to bridge the
At the Core
This article
Describes the components of ISO
17799 and provides a step-by-step
method for using it as the frame-
work for an information security
program
Tells how organizations can use
ISO 17799 in conjunction with
their electronic records manage-
ment processes and principles to
address legal and compliance
objectives
Discusses data loss reporting issues
P
Organizations can use ISO 17799 as a model for creating information security policies and procedures,
assigning roles
您可能关注的文档
- DB500112.PDF
- DCHMotorClub会员订购详情.PDF
- Demonstrationof10GbpsIDSIPSLivioRicciullilivio@.ppt
- DeterminantsofCorporateBorrowing.PDF
- DHHNZFCG2015-03.PDF
- DigitalRightsManagement(DRM)platformbasedonISO.doc
- DesignManufactureDeliver.ppt
- DINENISO13849-1is.PDF
- DirectoryandPersonRegistryImplementationDetails.ppt
- DissolutionLiquidation.PDF
最近下载
- 写给班主任的三十条建议.docx VIP
- 核反应堆设计软件:RELAP5二次开发_(17).RELAP5接口开发与数据交换.docx VIP
- 3.1网络改变世界 课件 2025-2026学年统编版道德与法治八年级上册.pptx VIP
- 三维超声评价子宫内膜容受性.pdf VIP
- 公基础知识(陕西省省情).pdf VIP
- (2025秋新版)二年级上册道德与法治全册教案.docx
- Viaton外研通单词机VT-D10使用指南.pdf
- 学校超市经营方案(完整).doc VIP
- 2024年秋季人教版七年级上册语文全册教学课件(考点精讲版).pptx
- 成都盒马鲜生末端物流配送管理与路径优化研究.doc VIP
文档评论(0)