Security Management Framework Flashcards
ISO/IEC 27000
A series of Information Security standards or best practices to help organisations improve their information security.
Published by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (ICO), the ISO 27000 standards set out comprehensive information security management system (ISMS) requirements.
ISMS
An Information Security Management System consists of all of the administrative, technical and operational controls that address information security within an organisation.
ISO 27000 twelve domains
- Risk assessment
- Security Policy
- Organisation of Information Security
- Asset management
- Physical and environmental security
- Communications and operations management
- Information systems acquisition, development and maintenance
- Access Control
- Information security incident management
- Business continuity management
- Compliance
What is the difference between the ISO cybersecurity model and the Open System Interconnection (OSI) model?
The structure of this ISO cybersecurity model differs from the Open System Interconnection (OSI) model in that it is a peer model that uses domains rather than layers to describe the security categories. Each domain has a direct relationship with the other domains.
Risk assessment
This is the first step in the risk management process, which determines the quantitative and qualitative value of risk related to a specific situation or threat.
Security policy
This document addresses the constraints and behaviours of individuals within an organisation and often specifies how data can be accessed, and what data is accessible by whom.
Organisation of Information Security
This is the governance model set out by an organization for information security.
Asset management
This is an inventory of and classification scheme for information assets within an organization.
Human resources security
This refers to the security procedures in place that relate to employees joining, moving within and leaving an organization.
Physical and environmental security
This refers to the physical protection of an organisation’s facilities and information.
Communications and operations management
This refers to the management of technical security controls of an organisation’s systems and networks.
Information systems acquisition, development and maintenance
This refers to security as an integral part of an organisation’s information systems.
Access Control
This describes how an organization restricts access rights to networks, systems, applications functions and data in order to prevent unauthorised user access.
Information Security Incident Management
This describes an organisation’s approach to the anticipation of and response to information security breaches.
Business Continuity Management
This describes the ability of an organisation to protect, maintain and recover business-critical activities following a disruption to information systems.