Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
Module 01
Chapter 02
Terms and definitions
Terms and Definitions
• Information security
• Preservation of confidentiality,
integrity and availability of
information;...
Terms and Definitions
• Information security event
• An identified occurrence of a system,
service or network state indica...
Terms and Definitions
• Risk Management
– Coordinated activities to direct
and control an organization
with regard to risk...
1
Flevy (www.flevy.com) is the marketplace
for premium documents. These
documents can range from Business
Frameworks to Fi...
Upcoming SlideShare
Loading in …5
×

ISO 27001 2013 - Introduction v3.0 - Part 2

131 views

Published on

This Slideshare presentation is a partial preview of the full business document. To view and download the full document, please go here:
http://flevy.com/browse/business-document/iso-27001-2013-introduction-v3-0-part-2-2566

BENEFITS OF DOCUMENT
1. Learn about ISO 27001 2013 practices

DOCUMENT DESCRIPTION

This module deals with the introduction to ISO 27001 2013 programs.

Published in: Business
  • Hi everyone, You can download the full document here: http://flevy.com/browse/business-document/iso-27001-2013-introduction-v3-0-part-2-2566
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

ISO 27001 2013 - Introduction v3.0 - Part 2

  1. 1. Module 01 Chapter 02 Terms and definitions
  2. 2. Terms and Definitions • Information security • Preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved 4 This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/iso-27001-2013-introduction-v3-0-part-2-2566
  3. 3. Terms and Definitions • Information security event • An identified occurrence of a system, service or network state indicating a possible breach of information security policy or failure of safeguards, or a previously unknown situation that may be security relevant 7 This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/iso-27001-2013-introduction-v3-0-part-2-2566
  4. 4. Terms and Definitions • Risk Management – Coordinated activities to direct and control an organization with regard to risk. • Risk Treatment – Process of selection and implementation of measures to modify risk 10 This document is a partial preview. Full document download can be found on Flevy: http://flevy.com/browse/document/iso-27001-2013-introduction-v3-0-part-2-2566
  5. 5. 1 Flevy (www.flevy.com) is the marketplace for premium documents. These documents can range from Business Frameworks to Financial Models to PowerPoint Templates. Flevy was founded under the principle that companies waste a lot of time and money recreating the same foundational business documents. Our vision is for Flevy to become a comprehensive knowledge base of business documents. All organizations, from startups to large enterprises, can use Flevy— whether it's to jumpstart projects, to find reference or comparison materials, or just to learn. Contact Us Please contact us with any questions you may have about our company. • General Inquiries support@flevy.com • Media/PR press@flevy.com • Billing billing@flevy.com

×