iso

Learn-about-CD-ROMDVD-File-System

Learn about CD-ROM/DVD File System

Learn about CD-ROM/DVD File System in this article computer systems require file systems, such as NTFS or UNIX, to exchange and access the data contained in files easily and quickly. They divide data stored on CD-ROMs into sectors, containing both user data and error correction codes, Users need not worry about which data is stored in which sector, but should have an understanding of the CD-ROM fife structure. ISO 9660 ISO (International Organization for Standardization) …

Learn about CD-ROM/DVD File System Read More »

ISO-27001-Annex-A.18.1.3-Protection-of-Records

ISO 27001 Annex : A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls

In this article explain ISO 27001 Annex : A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls this contols. A.18.1.3 Protection of Records Control- ISO 27001 Annex : A.18.1.3 Protection of Records Records shall, in accordance with the provisions to legislative, regulatory, contractual, and business requirements, to protect from loss, destruction, falsification, and unauthorized access and unauthorized release. Implementation Guidance- The related classification based on the …

ISO 27001 Annex : A.18.1.3 Protection of Records, A.18.1.4 Privacy and Protection of Personally Identifiable Information and A.18.1.5 Regulation of Cryptographic Controls Read More »

ISO-27001-Annex-A.17.1.3-Verify-Review-and-Evaluate-Information-Security-Continuity

ISO 27001 Annex : A.17.1.3 Verify, Review and Evaluate Information Security Continuity

Control- ISO 27001 Annex : A.17.1.3 Verify, Review and Evaluate Information Security Continuity In order to ensure accurate and productive to adverse circumstances, the company must review on-going controls on safety information defined and enforced at regular intervals. Implementation Guidance- Changes in organizational, technological, administrative and procedures, whether operational or framework, will lead to changes in the criteria for the continuity of information security. In such cases, the continuity of information security processes, procedures and …

ISO 27001 Annex : A.17.1.3 Verify, Review and Evaluate Information Security Continuity Read More »

ISO-27001-Annex-A.17-Information-Security-Aspects-of-Business-Continuity-Management

ISO 27001 Annex : A.17 Information Security Aspects of Business Continuity Management

ISO 27001 Annex : A.17 Information Security Aspects of Business Continuity Management in this article explain Information Security Continuity, Planning Information Security Continuity and Implementing Information Security Continuity this contols. A.17.1 Information Security Continuity Its objective is the continuity of information security should be integrated into the business continuity management processes of the organization. A17.1.1 Planning Information Security Continuity Control – In adverse circumstances, e.g. during a crisis or a catastrophe, the company will determine …

ISO 27001 Annex : A.17 Information Security Aspects of Business Continuity Management Read More »

ISO-27001-Annex-A.16.1.5-Response-to-Information-Security-Incidents

ISO 27001 Annex : A.16.1.5 Response to Information Security Incidents, A.16.1.6 Learning from Information Security Incidents & A.16.1.7 Collection of Evidence

In this article explain ISO 27001 Annex : A.16.1.5 Response to Information Security Incidents, A.16.1.6 Learning from Information Security Incidents & A.16.1.7 Collection of Evidence this controls. A.16.1.5 Response to Information Security Incidents Control- In the context of the documented procedures, information security incidents should be responded to. Implementation Guidance- A nominated point of contact and other pertinent people within the organization or external parties should be able to respond to information security incidents. The …

ISO 27001 Annex : A.16.1.5 Response to Information Security Incidents, A.16.1.6 Learning from Information Security Incidents & A.16.1.7 Collection of Evidence Read More »

ISO-27001-Annex-A.16.1.2-Reporting-Information-Security-Events

ISO 27001 Annex : A.16.1.2 Reporting Information Security Events, A.16.1.3 Reporting Information Security Weaknesses & A.16.1.4 Assessment of and Decision on Information Security Events

In this article explain ISO 27001 Annex : A.16.1.2 Reporting Information Security Events, A.16.1.3 Reporting Information Security Weaknesses & A.16.1.4 Assessment of and Decision on Information Security Events this contols. A.16.1.2 Reporting Information Security Events Control- Information security incidents should be reported as quickly as possible through appropriate management channels. Implementation Guidance- Both employees and contractors will be made aware of their responsibility as soon as possible for reporting security incidents. The reporting protocols and …

ISO 27001 Annex : A.16.1.2 Reporting Information Security Events, A.16.1.3 Reporting Information Security Weaknesses & A.16.1.4 Assessment of and Decision on Information Security Events Read More »

ISO-27001-Annex-A.16-Information-Security-Incident-Management

ISO 27001 Annex : A.16 Information Security Incident Management

ISO 27001 Annex : A.16 Information Security Incident Management in this aerticle explain Management of Information Security Incidents and Improvements and there Responsibilities & Procedures. A.16.1 Management of Information Security Incidents and Improvements It’s objective is to ensure a clear and successful strategy, including communication on security incidents and vulnerabilities, for information security incidents management. A.16.1.1 Responsibilities and Procedures Control- In order to ensure a quick, efficient, and organized response to ISO 27001 Annex : …

ISO 27001 Annex : A.16 Information Security Incident Management Read More »

ISO-27001-Annex-A.15.2-Supplier-Service-Delivery-Management

ISO 27001 Annex : A.15.2 Supplier Service Delivery Management

ISO 27001 Annex : A.15.2 Supplier Service Delivery Management It’s objective is to maintain, in compliance with supplier agreements, an agreed level of information security and delivery of service. A.15.2.1  Monitoring and Review of Supplier Services Control- Organizations shall monitor, review and audit the provision of service to suppliers on a regular basis. Implementation Guidance – Monitoring and review of supplier services will ensure respect for the terms and conditions of information security of the …

ISO 27001 Annex : A.15.2 Supplier Service Delivery Management Read More »

ISO 27001 Annex : A.15 Supplier Relationships

ISO 27001 Annex : A.15 Supplier Relationships in this article explaining Information Security in Supplier Relationships, and there policies . A.15.1  Information Security in Supplier Relationships It’s objective is ensuring the security of assets accessible to suppliers of the organization. A.15.1.1  Information Security Policy for Supplier Relationships Control- The supplier should be agreed with and documented information security requirements related to the risk mitigation of access by suppliers to organizational assets. “The company becomes more …

ISO 27001 Annex : A.15 Supplier Relationships Read More »

ISO-27001-Annex : A.14.3-Test-data

ISO 27001 Annex : A.14.3 Test data

ISO 27001 Annex : A.14.3  Test data its objective is to ensure that data used for research are secured. A.14.3.1  Protection of test data Control – Careful collection, security, and review of test data should be performed. Implementation Guidance – It should be avoided the use of operational information containing personal information or any other confidential information for test purposes. Where personal information or otherwise confidential information for testing purposes is used, all sensitive information …

ISO 27001 Annex : A.14.3 Test data Read More »