𝔖 Scriptorium
✦   LIBER   ✦

📁

ISO/IEC 27004:2016, Information technology — Security techniques — Information security management — Monitoring, measurement, analysis and evaluation

✍ Scribed by ISO/IEC JTC 1/SC 27


Publisher
BSI
Year
2016
Tongue
English
Leaves
63
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


BS ISO/IEC 27004 provides guidance on how to assess the performance of an Information Security Management System (ISMS) developed and implemented using BS ISO/IEC 27001. It explains how to develop and operate measurement processes, and how to assess and report the results of the associated measurement constructs.

Assessment and improvement of both processes and controls is an integral part of any management system. BS ISO/IEC 27004 shows how the effectiveness of an ISMS built using ISO/IEC 27001 can be monitored and assessed.


📜 SIMILAR VOLUMES


ISO/IEC 27004:2009, Information technolo
✍ ISO/IEC/JTC 1/SC 27 📂 Library 📅 2009 🏛 Multiple. Distributed through American National St 🌐 English

ISO/IEC 27004:2009 provides guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISMS) and controls or groups of controls, as specified in ISO/IEC 27001.ISO/IEC 27004:2009 is applicable to all t

[ISO/IEC 27000:2018] Information technol
✍ ISO/IEC JTC 1/SC 27 Information security, cybersecurity and privacy protection 📂 Library 📅 2018 🏛 ISO/IEC 🌐 English

ISO/IEC 27000:2018 provides the overview of information security management systems (ISMS). It also provides terms and definitions commonly used in the ISMS family of standards. This document is applicable to all types and sizes of organization (e.g. commercial enterprises, government agencies, not-

ISO/IEC 27003:2010, Information technolo
✍ ISO/IEC/JTC 1/SC 27 📂 Library 📅 2010 🏛 Multiple. Distributed through American National St 🌐 English

ISO/IEC 27003:2010 focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with ISO/IEC 27001:2005. It describes the process of ISMS specification and design from inception to the production of implementation p