SlideShare a Scribd company logo
1 of 9
SUBMITTED BY:
SHIVANI SHUKLA
B-38
15020441242
ISO/IEC 27001:2005
followed by Oracle
Financial Software Services
Knowledge Management
Submitted to: Mr Supratik Ghatak
ISO & IEC
 International Organization for
Standardization (ISO) founded on 23 February 1947
headquartered in Geneva, Switzerland.
 It has 162 member countries, of which India is has
national bodies considered the most representative
standards body has voting rights.
 ISO has formed joint committees with the International
Electrotechnical Commission (IEC)
 Founded on 26 June 1906 headquartered in London, UK
having 82 members to develop standards and
terminology in the areas of electrical, electronic and
related technologies.
ISO/IEC 27001:2005
Its full name is – Information technology – Security techniques
– Information security management systems – Requirements.
 Systematically examine the organization's information
security risks, taking account of the threats,
vulnerabilities, and impacts;
 Design and implement a coherent and comprehensive
suite of information security controls and/or other forms
of risk treatment (such as risk avoidance or risk transfer)
to address those risks that are deemed unacceptable; and
 Adopt an overarching management process to ensure that
the information security controls continue to meet the
organization's information security needs on an ongoing
basis.
ISO/IEC 27001:2005 Domains
 Asset Management: software assets ( applications,
software code, development tools, operational software),
information (database information, legal documentation,
manuals, policies & procedures, organizational
documents also consider the asset which has been shared
by the client (client related document,H/w,S/w). For
each asset a designated owner who will define the scope
of the policy (which parts of the organization are covered
under the policy), responsibility (who is ultimately
responsible for the policy), compliance (is compliance
mandatory or not, what are the guidelines to follow),
waiver criteria (on what basis can someone ask for a
waiver) and effective date (from when to when is the
policy applicable).
 Access Control:
It is the selective restriction of access to a place or other
resource. The typical organizational objectives of the access control
policy are to establish a procedure for user registration and de-
registration, establish a procedure to grant the correct level of
access privilege, establish a procedure to control password use,
password change and password removal, establish a procedure for
managements review of access rights, establish a procedure for
unattended equipment, maintain a clear desk policy, establish a
procedure to control network service access, establish a control
method for authentication of remote users, establish a procedure for
configuration ports, establish a procedure to segregate networks,
establish a procedure to use precise routing controls, establish a
procedure to control system utilities and to establish a procedure to
secure communications over mobile computing devices.
Network Security, Operating System &
Application Control
 The primary objectives of a
network security policy should
be to ensure that access to
company’s network is only
provided to authorized users,
that adequate controls are in
place to manage remote users,
that all equipment can be
recognized uniquely, that
networks should be segregated
based on needs, and that
appropriate network routing
protocols are enabled.
 Appropriate authentication
mechanisms for remote users.
 Allocation of network access
rights business and security
requirements
 Two-factor authentication used
for authenticating users using
mobile/remote systems
 All users in the organization
shall have a unique ID, No
systems or application details
shall be displayed before log-in,
In the condition of log-in
failure, the error message shall
not indicate which part of the
credential is incorrect, The
number of unsuccessful log-in
attempts shall be limited to
3/5/6 attempts, During log-in
process, all password entries
shall be hidden by a symbol, All
operating systems and
application shall time out due
to inactivity in 5/10/15/30
minutes, All applications shall
have dedicated administrative
menus to control access rights
of users.
Implementation
 Oracle's security policies and procedures are reviewed and overseen by
Oracle Global Information Security (GIS). GIS is responsible for security
oversight, compliance and enforcement, and for conducting information
security assessments and leading the development of information security
policy and strategy.
 Oracle is also committed to reducing risks of human error, theft, fraud, and
misuse of Oracle facilities. Oracle's efforts include making personnel aware
of security policies and training employees to implement security policies.
Oracle employees are required to maintain the confidentiality of services
data. Employees' obligations include written confidentiality agreements,
regular training on information protection, and compliance with company
policies concerning protection of confidential information.
 Oracle promptly evaluates and responds to incidents that create suspicions
of unauthorized handling of services data. Oracle GIS and Legal are
informed of such incidents and, depending on the nature of the activity,
define escalation paths and response teams to address the incidents.
TRUSTe Certification
Oracle has received TRUSTe's Privacy Seal
signifying that this privacy policy and practices have
been reviewed for compliance with the TRUSTe
program that is viewable on the validation page
available by clicking the TRUSTe seal. The TRUSTed
Data Collection certification only applies to the
Services Privacy Policy. It does not cover personal
information that may be collected through software
downloaded from the Oracle.com websites or Oracle
publications. Other Oracle products and services are
covered by other TRUSTe certifications.
Shivani shukla_B38_KnowledgeManagement

More Related Content

What's hot

IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policyssuser06c4a6
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Computer engineering company
 
information security technology
information security technologyinformation security technology
information security technologygarimasagar
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practiceparves kamal
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Maganathin Veeraragaloo
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksHow To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksTammy Clark
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Donald E. Hester
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and toolsVibhor Raut
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Complianceseanpizzy
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Kimberly Simon MBA
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentAdetula Bunmi
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security FrameworkNada G.Youssef
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation Technology Society Nepal
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Securitychauhankapil
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointbradleyl2
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-applSR NAIDU
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System AdministrationLisa Dowdell, MSISTM
 

What's hot (19)

IT Network Security Policy
IT Network Security PolicyIT Network Security Policy
IT Network Security Policy
 
Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.Security Management Strategies and Defense and their uses.
Security Management Strategies and Defense and their uses.
 
information security technology
information security technologyinformation security technology
information security technology
 
Information security management best practice
Information security management best practiceInformation security management best practice
Information security management best practice
 
Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management Domain 5 - Identity and Access Management
Domain 5 - Identity and Access Management
 
Policy and procedure
Policy and procedurePolicy and procedure
Policy and procedure
 
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information LeaksHow To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
How To Successfully Defend Against Irc Bots, Compromises, And Information Leaks
 
Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001Information Technology Security A Brief Overview 2001
Information Technology Security A Brief Overview 2001
 
Security management and tools
Security management and toolsSecurity management and tools
Security management and tools
 
ISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An IntorductionISO / IEC 27001:2005 – An Intorduction
ISO / IEC 27001:2005 – An Intorduction
 
Auditing SOX ITGC Compliance
Auditing SOX ITGC ComplianceAuditing SOX ITGC Compliance
Auditing SOX ITGC Compliance
 
Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017Health care compliance webinar may 10 2017
Health care compliance webinar may 10 2017
 
The Importance of Security within the Computer Environment
The Importance of Security within the Computer EnvironmentThe Importance of Security within the Computer Environment
The Importance of Security within the Computer Environment
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Information security: importance of having defined policy & process
Information security: importance of having defined policy & processInformation security: importance of having defined policy & process
Information security: importance of having defined policy & process
 
Basics of Information System Security
Basics of Information System SecurityBasics of Information System Security
Basics of Information System Security
 
Introduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power pointIntroduction to Health Informatics Ch11 power point
Introduction to Health Informatics Ch11 power point
 
Ch02 mis-ctrl-appl
Ch02 mis-ctrl-applCh02 mis-ctrl-appl
Ch02 mis-ctrl-appl
 
Security Management | System Administration
Security Management | System AdministrationSecurity Management | System Administration
Security Management | System Administration
 

Viewers also liked

Pictures of Large Projects Permitted and Completed
Pictures of Large Projects Permitted and CompletedPictures of Large Projects Permitted and Completed
Pictures of Large Projects Permitted and CompletedDaniel Bowker
 
Cuidar do corpo
Cuidar do corpoCuidar do corpo
Cuidar do corpoHelio Cruz
 
Kerala school-approach paper november
Kerala school-approach paper novemberKerala school-approach paper november
Kerala school-approach paper novemberkgbiju
 
Entrevista Prof Alexandre Rezende - Metrópole
Entrevista Prof Alexandre Rezende - MetrópoleEntrevista Prof Alexandre Rezende - Metrópole
Entrevista Prof Alexandre Rezende - MetrópoleInova Business School
 
Cfd03 thermal analysis-of-automotive-lumax
Cfd03 thermal analysis-of-automotive-lumaxCfd03 thermal analysis-of-automotive-lumax
Cfd03 thermal analysis-of-automotive-lumaxAnand Kumar Chinni
 
GEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATION
GEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATIONGEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATION
GEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATIONGeorge Dumitrache
 

Viewers also liked (11)

Resume_optics_Gupta Roy
Resume_optics_Gupta RoyResume_optics_Gupta Roy
Resume_optics_Gupta Roy
 
M.Naren_CB.BU.P2MBA 14036
M.Naren_CB.BU.P2MBA 14036M.Naren_CB.BU.P2MBA 14036
M.Naren_CB.BU.P2MBA 14036
 
MMNONAK 2
MMNONAK 2MMNONAK 2
MMNONAK 2
 
4. Biodiversidad
4. Biodiversidad4. Biodiversidad
4. Biodiversidad
 
Pictures of Large Projects Permitted and Completed
Pictures of Large Projects Permitted and CompletedPictures of Large Projects Permitted and Completed
Pictures of Large Projects Permitted and Completed
 
Cuidar do corpo
Cuidar do corpoCuidar do corpo
Cuidar do corpo
 
Kerala school-approach paper november
Kerala school-approach paper novemberKerala school-approach paper november
Kerala school-approach paper november
 
Entrevista Prof Alexandre Rezende - Metrópole
Entrevista Prof Alexandre Rezende - MetrópoleEntrevista Prof Alexandre Rezende - Metrópole
Entrevista Prof Alexandre Rezende - Metrópole
 
Cfd03 thermal analysis-of-automotive-lumax
Cfd03 thermal analysis-of-automotive-lumaxCfd03 thermal analysis-of-automotive-lumax
Cfd03 thermal analysis-of-automotive-lumax
 
Semiotica de la arquitectura
Semiotica de la arquitecturaSemiotica de la arquitectura
Semiotica de la arquitectura
 
GEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATION
GEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATIONGEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATION
GEOGRAPHY YEAR 9: THE HISTORY OF SPACE EXPLORATION
 

Similar to Shivani shukla_B38_KnowledgeManagement

Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessmentjenito21
 
Security
SecuritySecurity
Securitya1aass
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdfkarthikvcyber
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docxLynellBull52
 
Information Security
Information SecurityInformation Security
Information Securitychenpingling
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...abhichowdary16
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.pptkarthikvcyber
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditingPiyush Jain
 
ERP System Security Data Privacy and Governance
ERP System Security Data Privacy and GovernanceERP System Security Data Privacy and Governance
ERP System Security Data Privacy and GovernanceSean Badiru
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentationAlan Holyoke
 
Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Lillian Ekwosi-Egbulem
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network designnephtalie
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnairePriyanka Aash
 

Similar to Shivani shukla_B38_KnowledgeManagement (20)

Ch06 Policy
Ch06 PolicyCh06 Policy
Ch06 Policy
 
R.a 1
R.a 1R.a 1
R.a 1
 
Risk Assessment
Risk AssessmentRisk Assessment
Risk Assessment
 
Pindad iso27000 2016 smki
Pindad   iso27000 2016 smkiPindad   iso27000 2016 smki
Pindad iso27000 2016 smki
 
Security
SecuritySecurity
Security
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Information Security
Information SecurityInformation Security
Information Security
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
 
File000169
File000169File000169
File000169
 
Logging, monitoring and auditing
Logging, monitoring and auditingLogging, monitoring and auditing
Logging, monitoring and auditing
 
ERP System Security Data Privacy and Governance
ERP System Security Data Privacy and GovernanceERP System Security Data Privacy and Governance
ERP System Security Data Privacy and Governance
 
Phi 235 social media security users guide presentation
Phi 235 social media security users guide presentationPhi 235 social media security users guide presentation
Phi 235 social media security users guide presentation
 
5757912.ppt
5757912.ppt5757912.ppt
5757912.ppt
 
Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards Applying Security Control to Implement EFG FCU Standards
Applying Security Control to Implement EFG FCU Standards
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
Medical facility network design
Medical facility network designMedical facility network design
Medical facility network design
 
Supplier security assessment questionnaire
Supplier security assessment questionnaireSupplier security assessment questionnaire
Supplier security assessment questionnaire
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

Shivani shukla_B38_KnowledgeManagement

  • 1. SUBMITTED BY: SHIVANI SHUKLA B-38 15020441242 ISO/IEC 27001:2005 followed by Oracle Financial Software Services Knowledge Management Submitted to: Mr Supratik Ghatak
  • 2. ISO & IEC  International Organization for Standardization (ISO) founded on 23 February 1947 headquartered in Geneva, Switzerland.  It has 162 member countries, of which India is has national bodies considered the most representative standards body has voting rights.  ISO has formed joint committees with the International Electrotechnical Commission (IEC)  Founded on 26 June 1906 headquartered in London, UK having 82 members to develop standards and terminology in the areas of electrical, electronic and related technologies.
  • 3. ISO/IEC 27001:2005 Its full name is – Information technology – Security techniques – Information security management systems – Requirements.  Systematically examine the organization's information security risks, taking account of the threats, vulnerabilities, and impacts;  Design and implement a coherent and comprehensive suite of information security controls and/or other forms of risk treatment (such as risk avoidance or risk transfer) to address those risks that are deemed unacceptable; and  Adopt an overarching management process to ensure that the information security controls continue to meet the organization's information security needs on an ongoing basis.
  • 4. ISO/IEC 27001:2005 Domains  Asset Management: software assets ( applications, software code, development tools, operational software), information (database information, legal documentation, manuals, policies & procedures, organizational documents also consider the asset which has been shared by the client (client related document,H/w,S/w). For each asset a designated owner who will define the scope of the policy (which parts of the organization are covered under the policy), responsibility (who is ultimately responsible for the policy), compliance (is compliance mandatory or not, what are the guidelines to follow), waiver criteria (on what basis can someone ask for a waiver) and effective date (from when to when is the policy applicable).
  • 5.  Access Control: It is the selective restriction of access to a place or other resource. The typical organizational objectives of the access control policy are to establish a procedure for user registration and de- registration, establish a procedure to grant the correct level of access privilege, establish a procedure to control password use, password change and password removal, establish a procedure for managements review of access rights, establish a procedure for unattended equipment, maintain a clear desk policy, establish a procedure to control network service access, establish a control method for authentication of remote users, establish a procedure for configuration ports, establish a procedure to segregate networks, establish a procedure to use precise routing controls, establish a procedure to control system utilities and to establish a procedure to secure communications over mobile computing devices.
  • 6. Network Security, Operating System & Application Control  The primary objectives of a network security policy should be to ensure that access to company’s network is only provided to authorized users, that adequate controls are in place to manage remote users, that all equipment can be recognized uniquely, that networks should be segregated based on needs, and that appropriate network routing protocols are enabled.  Appropriate authentication mechanisms for remote users.  Allocation of network access rights business and security requirements  Two-factor authentication used for authenticating users using mobile/remote systems  All users in the organization shall have a unique ID, No systems or application details shall be displayed before log-in, In the condition of log-in failure, the error message shall not indicate which part of the credential is incorrect, The number of unsuccessful log-in attempts shall be limited to 3/5/6 attempts, During log-in process, all password entries shall be hidden by a symbol, All operating systems and application shall time out due to inactivity in 5/10/15/30 minutes, All applications shall have dedicated administrative menus to control access rights of users.
  • 7. Implementation  Oracle's security policies and procedures are reviewed and overseen by Oracle Global Information Security (GIS). GIS is responsible for security oversight, compliance and enforcement, and for conducting information security assessments and leading the development of information security policy and strategy.  Oracle is also committed to reducing risks of human error, theft, fraud, and misuse of Oracle facilities. Oracle's efforts include making personnel aware of security policies and training employees to implement security policies. Oracle employees are required to maintain the confidentiality of services data. Employees' obligations include written confidentiality agreements, regular training on information protection, and compliance with company policies concerning protection of confidential information.  Oracle promptly evaluates and responds to incidents that create suspicions of unauthorized handling of services data. Oracle GIS and Legal are informed of such incidents and, depending on the nature of the activity, define escalation paths and response teams to address the incidents.
  • 8. TRUSTe Certification Oracle has received TRUSTe's Privacy Seal signifying that this privacy policy and practices have been reviewed for compliance with the TRUSTe program that is viewable on the validation page available by clicking the TRUSTe seal. The TRUSTed Data Collection certification only applies to the Services Privacy Policy. It does not cover personal information that may be collected through software downloaded from the Oracle.com websites or Oracle publications. Other Oracle products and services are covered by other TRUSTe certifications.