• No results found

ISO/IEC 27000, 27001 and 27002 for Information Security Management

N/A
N/A
Protected

Academic year: 2020

Share "ISO/IEC 27000, 27001 and 27002 for Information Security Management"

Copied!
9
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1. Development of standards ISO 27000, ISO 27001, and ISO 27002.
Figure 2. Number of certificates accord. ISO 27001 [4].
Figure 4. PDCA cycle in ISO 27000 [9].
Table 2. ISO 27001 control objectives [8].
+3

References

Related documents

Critics may point to the stagflaticn that Japan faced after appl/ng Keynesian fiscal policy as a counter- argumenttothe above example. After all, in this case,

By developing formal and informal relationships with the business community, North St. Paul can contin- ue to recapture goodwill lost throughout previous years and regimes and focus

considerable pine tree obstructions of the sky. The five static measurement session details are shown in Table 12. The sessions pointing in the zenith direction generally had more

When the ESII evaluation is coupled with the temporal window model, predictions can be made on the effects of different kinds of hearing loss on speech intelligibility.. These have

In this way, our study reveals how the type of costs (i.e., one-off entry costs versus recurring taxes) imposed by government regulations can influence the extent of

Public transport is made of private-owned means of transport, notably taxis, collective taxis (commonly called “cent cent”-so called because of the silver franc CFA 100

The removal of the bottleneck in Sweden is calculated to generate cost savings for the entire route.21 The Swedish Transport Administration (Ekmark, 2012) estimates that

We propose two techniques to judge if an estimate is globally optimal (i.e., it is the ML estimate), and we show that when the duality gap is zero one can compute an optimal