What is the purpose of the ISO IEC 17799?
Contents
What is the purpose of the ISO IEC 17799?
‘ISO/IEC 17799:2005 establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. The objectives outlined provide general guidance on the commonly accepted goals of information security management.
Is ISO 17799 still valid?
ISO 17799 Information Security Standard. ISO 17799 is obsolete. Please see ISO IEC 27002 2013. program or improve its current information security practices.
What are the ten sections of ISO IEC 17799?
The ISO/IEC 17799 details 127 security measures, organized into 10 sections; these specify best practices for: business continuity planning; system access control; system development and maintenance; physical and environmental security; compliance; personnel security; security organization; computer and operations …
What is iso1799?
ISO/IEC 17799:2005 establishes guidelines and general principles for initiating, implementing, maintaining, and improving information security management in an organization. The objectives outlined provide general guidance on the commonly accepted goals of information security management.
What is BS7799 security standard?
The information security standards BS7799 was created in 1995, by the British Standards Institution (BSI), as a standard to guide the development and implementation of an Information Security Management System, commonly known as an ISMS.
What was ISO 17799 renamed as?
ISO 27002
Late in 2007, to align the series numbering system, ISO 17799 was renamed to ISO 27002.
What are ISO 7799?
ISO/IEC 17799 is intended to provide a single reference point for the wide range of controls needed for most situations where information technology is used in industry, commerce, and communication. This detailed security standard is divided into 10 key sections: 1.
What do you mean by ISO 17799 BS7799 model?
for information security management
BS 7799, the standard for information security management, covers the appropriateness and effective use of security controls following a risk analysis that identifies the relevant assets and the security threats to them.