免费注册 查看新帖 |

Chinaunix

  平台 论坛 博客 文库
最近访问板块 发新帖
查看: 3504 | 回复: 1
打印 上一主题 下一主题

ISO 17799 介绍 [复制链接]

论坛徽章:
0
跳转到指定楼层
1 [收藏(0)] [报告]
发表于 2002-07-30 21:51 |只看该作者 |倒序浏览
ISO 17799* is a detailed information security standard designed for implementation in the commercial sector. It was derived from the British Standard BS7799 and published in 2000. The standard is a comprehensive set of controls considered to be best practices in information security including policies, practices, procedures, organizational structures and software functions. The ten sections of controls described in the standard are summarized below. \r\n\r\n\r\nSecurity Policy\r\nThe objectives of this section are to provide management direction and support for information security. A policy document should be published and communicated to all employees including overall objectives and scope. Specific elements may include compliance with legislative and contractual requirements, access to information resources, security education, monitoring and enforcement. \r\n\r\nSecurity Organisation\r\nThe objectives of this section are to develop a management framework for the purpose of implementing information security in a company. Roles and responsibilities are to be assigned. Special emphasis should be placed on information assets accessed by third parties. Outsourcing arrangements should be managed according to risk and corresponding controls. \r\n\r\nAsset Classification and Control\r\nAll major information assets should be accounted for and have an assigned owner. Information assets include databases and data files, software assets and physical hardware. Information should be classified to indicate need, priorities and degree of protection. \r\n\r\nPersonnel Security\r\nThe objectives of this section are to reduce risks of human error, theft, fraud or misuse of IT facilities. Security should be considered when recruiting new employees, included in contracts and monitored during an individual’s employment. \r\n\r\nPhysical and Environmental Security\r\nThe objectives of this section are to prevent unauthorized access, damage and interference to business information, activities and premises. IT facilities should be housed in secure areas and protected by a security perimeter with entry controls. \r\n\r\nComputer & Operations Management\r\nThe objectives of this section are to ensure the correct and secure operation of information processing facilities. Advance planning and preparation is necessary to ensure adequate capacity and resources. Preventive controls are required to protect against malicious software including viruses and trojan horses. Network management should include controls to protect data as well as network services from unauthorized access.\r\n\r\nAccess Control\r\nThe objectives of this section are to control access to information, ensure the protection of networked services, detect unauthorized activities and provide security for remote access. \r\n\r\nSystem Development and Maintenance\r\nThe objectives of this section are to ensure security is designed into information systems; to prevent loss, modification or misuse of user data in application systems; to protect the confidentiality, authenticity and integrity of information; and to maintain the security of application system software and data. \r\n\r\nBusiness Continuity Planning\r\nThe objective of this section is to protect critical business processes from the effects of major failure or disasters. The capability should be developed, maintained and practiced for quick response to interruptions. \r\n\r\nCompliance\r\nThe objectives of this section are to avoid breaches of any criminal or civil law, statutory, regulatory or contractual obligations. Information systems must also comply with organizational security policies and standards.

论坛徽章:
0
2 [报告]
发表于 2002-07-30 22:05 |只看该作者

我顶!

好东西.最好有现成的文本文件可以下载.嘿嘿....贪心了点
您需要登录后才可以回帖 登录 | 注册

本版积分规则 发表回复

  

北京盛拓优讯信息技术有限公司. 版权所有 京ICP备16024965号-6 北京市公安局海淀分局网监中心备案编号:11010802020122 niuxiaotong@pcpop.com 17352615567
未成年举报专区
中国互联网协会会员  联系我们:huangweiwei@itpub.net
感谢所有关心和支持过ChinaUnix的朋友们 转载本站内容请注明原作者名及出处

清除 Cookies - ChinaUnix - Archiver - WAP - TOP