博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
Information Systems Security Assessment – Open information security framework
阅读量:2436 次
发布时间:2019-05-10

本文共 1843 字,大约阅读时间需要 6 分钟。

The Information Systems Assessment (ISSAF) seeks to integrate the following management and internal control checklists:

-Evaluate the organizations policies & processes to report on their compliance with IT industry standards, and applicable laws and regulatory requirements

-Identify and assess the business dependencies on infrastructure services provided by IT
-Conduct vulnerability assessments & penetration tests to highlight system vulnerabilities that could result in potential risks to information assets
-Specify evaluation models by security domains to :
-Find mis-configurations and rectify them
-Identifying risks related to technologies and addressing them
-Identifying risks within people or business processes and addressing them
-Strengthening existing processes and technologies
-Provide best practices and procedures to support business continuity initiatives

2a01da1eef21063666f6000921e68074 Information Systems Security Assessment   Open information security framework

Benefits of ISSAF

-The ISSAF is intended to comprehensively report on the implementation of existing controls to support IEC/ISO 27001:2005(BS7799), Sarbanes Oxley SOX404, CoBIT, SAS70 and COSO, thus adding value to the operational aspects of IT related business transformation programmes.

-Its primary value will derive from the fact that it provides a tested resource for security practitioners thus freeing them up from commensurate investment in commercial resources or extensive internal research to address their information security needs.
-It is designed from the ground up to evolve into a comprehensive body of knowledge for organizations seeking independence and neutrality in their security assessment efforts.

This is not but posters of information security awareness use it impress your boss, colleague , clients etc ..

Download Information Systems Security Assessment

 

download:http://www.oissg.org/custom/information-security-awareness-poster-3.html

转载地址:http://ywqmb.baihongyu.com/

你可能感兴趣的文章
IBM DB2 日常维护汇总(三)(转)
查看>>
怎样创建.NET Web Service(4)(转)
查看>>
Symbian OS 开发初级手册(转)
查看>>
限制只能中文输入的方法(转)
查看>>
MySQL进阶SELECT篇(转)
查看>>
SQL Server中死锁产生的原因及解决办法(转)
查看>>
南阳铁通推出宽带“网吧式”服务(转)
查看>>
共享池 shared pool
查看>>
一张图搞定Java面向对象
查看>>
DOORS需求管理工具的其他资料
查看>>
使用 Rational RequisitePro 进行需求管理的新技术
查看>>
最新解决方案助力Borland ALM亚太应用
查看>>
Borland ALM之需求定义和管理解决方案
查看>>
需求管理详解
查看>>
Verizon选择Borland控制开发流程并降低风险
查看>>
Borland 崭新的Caliber Define IT产品
查看>>
IBM Rational RequisitePro集成简介
查看>>
EDS用Borland作为它的全球标准
查看>>
集成 IBM Rational RequisitePro 与 IBM Rational Portfolio Manager
查看>>
OOAD利器Rational Rose的介绍
查看>>