SlideShare a Scribd company logo
Implementing & Evaluating ISO 27001:2013 Framework in a
Corporate
Due to growing information security risks, organizations must
continually monitor and effectively manage the security of their
computing infrastructure. Further, organizations must ensure the
confidentiality, integrity, and availability of their information
assets.
ISO 27001:2005 is a time-proven international standard of best
practices published by the International Organization for
Standardization (ISO) for establishing, maintaining, and
improving security programs for all organizations. An ISO
27001 based Information Security Management System (ISMS)
is a set of integrated processes that govern the management of
security program policies and procedures.
Learning Outcomes: At the end of the assignment, students
should be able to:
▪ Know the importance of ISO 27001 framework for
implementing CIA Effat University.
▪ How this framework is used to develop (ISMS System) for
Effat University to fulfil its security goals to run university
business successfully & effectively.
Company Name: (Effat University Jeddah)
Individual Deliverables (Research & Documentation by
individual members)
1. Select a corporate to apply ISO 27001 framework to develop
an ISMS system for the corporate selected to achieve the
following objectives:
➢ Protect intellectual property rights, financial interests,
university records & students records and other useful data and
completive edge
➢ Protect IT infrastructure and Network & Application
program, operations and services.
➢ Safeguard the interests and privacy of all employees,
students, staff and stakeholders etc. and retain their trust
➢ Comply with the law and defend against legal action
➢ Maintain the reputation of the university
Notes:
▪ Above deliverable should include proper evaluation and
justification.
▪ Use appropriate diagrams or other details wherever possible to
illustrate your justifications and explanations.

More Related Content

Similar to Implementing & Evaluating ISO 270012013 Framework in a Corporate.docx

NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
NA Putra
 
Key Features of ISO 27001
Key Features of ISO 27001Key Features of ISO 27001
Key Features of ISO 27001
zahirazahid
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Tammy Clark
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
Ãsħâr Ãâlâm
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
Yerlin Sturdivant
 
ISO/IEC 27001.pdf
ISO/IEC 27001.pdfISO/IEC 27001.pdf
ISO/IEC 27001.pdf
LiiewaOfficial
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
PECB
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
Akhil Garg
 
Iso 27001 isms - white paper
Iso 27001   isms -   white paperIso 27001   isms -   white paper
Iso 27001 isms - white paper
Lakshy Management Consultant Pvt Ltd
 
ISO 27001 Certification in Dubai
ISO 27001 Certification in DubaiISO 27001 Certification in Dubai
ISO 27001 Certification in Dubai
Mike Walker
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
ESET
 
What are the essential aspects of ISO 27001 Certification in Netherlands.pdf
What are the essential aspects of ISO 27001 Certification in Netherlands.pdfWhat are the essential aspects of ISO 27001 Certification in Netherlands.pdf
What are the essential aspects of ISO 27001 Certification in Netherlands.pdf
Anoosha Factocert
 
ISO 27001 Information Security Management.pdf
ISO 27001 Information Security Management.pdfISO 27001 Information Security Management.pdf
ISO 27001 Information Security Management.pdf
Nepal Realistic Solution Pvt. Ltd.
 
Ebsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal PresentationEbsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal Presentation
Publicly traded global multi-billion services company
 
Iso 27001 isms
Iso 27001 ismsIso 27001 isms
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
sdfghj21
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
kevlekalakala
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
PECB
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
AlliedConSapCourses
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
IT Governance Ltd
 

Similar to Implementing & Evaluating ISO 270012013 Framework in a Corporate.docx (20)

NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001NQA Your Complete Guide to ISO 27001
NQA Your Complete Guide to ISO 27001
 
Key Features of ISO 27001
Key Features of ISO 27001Key Features of ISO 27001
Key Features of ISO 27001
 
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...Gs Us Roadmap For A World Class Information Security Management System– Isoie...
Gs Us Roadmap For A World Class Information Security Management System– Isoie...
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 
Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001Planning for-and implementing ISO 27001
Planning for-and implementing ISO 27001
 
ISO/IEC 27001.pdf
ISO/IEC 27001.pdfISO/IEC 27001.pdf
ISO/IEC 27001.pdf
 
Taking Control of Information Security
Taking Control of Information SecurityTaking Control of Information Security
Taking Control of Information Security
 
Overview of ISO 27001 ISMS
Overview of ISO 27001 ISMSOverview of ISO 27001 ISMS
Overview of ISO 27001 ISMS
 
Iso 27001 isms - white paper
Iso 27001   isms -   white paperIso 27001   isms -   white paper
Iso 27001 isms - white paper
 
ISO 27001 Certification in Dubai
ISO 27001 Certification in DubaiISO 27001 Certification in Dubai
ISO 27001 Certification in Dubai
 
How to implement a robust information security management system?
How to implement a robust information security management system?How to implement a robust information security management system?
How to implement a robust information security management system?
 
What are the essential aspects of ISO 27001 Certification in Netherlands.pdf
What are the essential aspects of ISO 27001 Certification in Netherlands.pdfWhat are the essential aspects of ISO 27001 Certification in Netherlands.pdf
What are the essential aspects of ISO 27001 Certification in Netherlands.pdf
 
ISO 27001 Information Security Management.pdf
ISO 27001 Information Security Management.pdfISO 27001 Information Security Management.pdf
ISO 27001 Information Security Management.pdf
 
Ebsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal PresentationEbsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal Presentation
 
Iso 27001 isms
Iso 27001 ismsIso 27001 isms
Iso 27001 isms
 
Solve the exercise in security management.pdf
Solve the exercise in security management.pdfSolve the exercise in security management.pdf
Solve the exercise in security management.pdf
 
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptxChapter 1 Best Practices, Standards, and a Plan of Action.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
GDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risksGDPR compliance and information security: Reducing data breach risks
GDPR compliance and information security: Reducing data breach risks
 

More from terirasco

This homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docxThis homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docx
terirasco
 
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docxThis has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
terirasco
 
This final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docxThis final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docx
terirasco
 
This has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docxThis has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docx
terirasco
 
This has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docxThis has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docx
terirasco
 
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docxthis essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
terirasco
 
This chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docxThis chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docx
terirasco
 
This discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docxThis discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docx
terirasco
 
This course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docxThis course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docx
terirasco
 
This chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docxThis chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docx
terirasco
 
This assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docxThis assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docx
terirasco
 
This Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docxThis Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docx
terirasco
 
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docxThis assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
terirasco
 
This assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docxThis assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docx
terirasco
 
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docxThis assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
terirasco
 
This assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docxThis assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docx
terirasco
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
terirasco
 
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docxThis assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
terirasco
 
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docxThis assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
terirasco
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
terirasco
 

More from terirasco (20)

This homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docxThis homework cannot be done until after we watch the movie 12 Angry.docx
This homework cannot be done until after we watch the movie 12 Angry.docx
 
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docxThis has 4 parts and needs to be 2 paragraphs long each one with ref.docx
This has 4 parts and needs to be 2 paragraphs long each one with ref.docx
 
This final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docxThis final project aims to empirically complement concurrent theor.docx
This final project aims to empirically complement concurrent theor.docx
 
This has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docxThis has to be done in an IDE and I need the entire application fold.docx
This has to be done in an IDE and I need the entire application fold.docx
 
This has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docxThis has 4 parts and needs to be 3 paragraphs long with references..docx
This has 4 parts and needs to be 3 paragraphs long with references..docx
 
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docxthis essay are  pursuasive essay and it should be 3 pages.and yo.docx
this essay are  pursuasive essay and it should be 3 pages.and yo.docx
 
This chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docxThis chapter reflection should beinclude1.Should be 1 to.docx
This chapter reflection should beinclude1.Should be 1 to.docx
 
This discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docxThis discussion provides an opportunity to evaluate a variety of dig.docx
This discussion provides an opportunity to evaluate a variety of dig.docx
 
This course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docxThis course is in Business EthicsWhen considering ethical behav.docx
This course is in Business EthicsWhen considering ethical behav.docx
 
This chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docxThis chapter provides an explanation of what leads to the emergent p.docx
This chapter provides an explanation of what leads to the emergent p.docx
 
This assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docxThis assignment requires Ambulatory Care Coding experience.You CAN.docx
This assignment requires Ambulatory Care Coding experience.You CAN.docx
 
This Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docxThis Assignment will give you an opportunity to apply techniques of .docx
This Assignment will give you an opportunity to apply techniques of .docx
 
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docxThis assignment requires 3 drafts, 2 rough drafts and the final draf.docx
This assignment requires 3 drafts, 2 rough drafts and the final draf.docx
 
This assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docxThis assignment tests your ability to correctly identify and apply.docx
This assignment tests your ability to correctly identify and apply.docx
 
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docxThis assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
This assignment is due Monday Jan. 25 at 8pm EST. and guidlines .docx
 
This assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docxThis assignment is to be completed with A+ original work due S.docx
This assignment is to be completed with A+ original work due S.docx
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
 
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docxThis assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
This assignment is due TOMORROW Monday March 7 at 12 noon (midda.docx
 
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docxThis assignment is due on Tuesday Dec 29th before midnight estern st.docx
This assignment is due on Tuesday Dec 29th before midnight estern st.docx
 
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docxThis assignment is due Tuesday, December 1st @ 1600 easternpl.docx
This assignment is due Tuesday, December 1st @ 1600 easternpl.docx
 

Recently uploaded

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Implementing & Evaluating ISO 270012013 Framework in a Corporate.docx

  • 1. Implementing & Evaluating ISO 27001:2013 Framework in a Corporate Due to growing information security risks, organizations must continually monitor and effectively manage the security of their computing infrastructure. Further, organizations must ensure the confidentiality, integrity, and availability of their information assets. ISO 27001:2005 is a time-proven international standard of best practices published by the International Organization for Standardization (ISO) for establishing, maintaining, and improving security programs for all organizations. An ISO 27001 based Information Security Management System (ISMS) is a set of integrated processes that govern the management of security program policies and procedures. Learning Outcomes: At the end of the assignment, students should be able to: ▪ Know the importance of ISO 27001 framework for implementing CIA Effat University. ▪ How this framework is used to develop (ISMS System) for Effat University to fulfil its security goals to run university
  • 2. business successfully & effectively. Company Name: (Effat University Jeddah) Individual Deliverables (Research & Documentation by individual members) 1. Select a corporate to apply ISO 27001 framework to develop an ISMS system for the corporate selected to achieve the following objectives: ➢ Protect intellectual property rights, financial interests, university records & students records and other useful data and completive edge ➢ Protect IT infrastructure and Network & Application program, operations and services. ➢ Safeguard the interests and privacy of all employees, students, staff and stakeholders etc. and retain their trust ➢ Comply with the law and defend against legal action ➢ Maintain the reputation of the university Notes:
  • 3. ▪ Above deliverable should include proper evaluation and justification. ▪ Use appropriate diagrams or other details wherever possible to illustrate your justifications and explanations.