Ads
related to: it security best practicescdw.com has been visited by 1M+ users in the past month
referalanswer.com has been visited by 10K+ users in the past month
trendsanswer.com has been visited by 100K+ users in the past month
Search results
Results from the WOW.Com Content Network
Information security is the practice of protecting information by mitigating information risks. It is part of information risk management. [1] It typically involves preventing or reducing the probability of unauthorized or inappropriate access to data or the unlawful use, disclosure, disruption, deletion, corruption, modification, inspection, recording, or devaluation of information.
The newest version of NERC 1300 is called CIP-002-3 through CIP-009-3 (CIP=Critical Infrastructure Protection). These standards secure bulk electric systems, although NERC has created standards in other areas. The bulk electric system standards also provide network security administration while supporting best-practice industry processes.
An area is broken down further into sections, each of which contains detailed specifications of information security best practice. Each statement has a unique reference. For example, SM41.2 indicates that a specification is in the Security Management aspect, area 4, section 1, and is listed as specification No. 2 within that section.
The framework integrates existing standards, guidelines, and best practices to provide a structured approach to cybersecurity risk management. The CSF is composed of three primary components: the Core, Implementation Tiers, and Profiles.
ISO/IEC 27002 provides best practice recommendations on information security controls for use by those responsible for initiating, implementing or maintaining information security management systems (ISMS). Information security is defined within the standard in the context of the CIA triad:
The first part, containing the best practices for information security management, was revised in 1998; after a lengthy discussion in the worldwide standards bodies, it was eventually adopted by ISO as ISO/IEC 17799, "Information Technology - Code of practice for information security management." in 2000.
Ads
related to: it security best practicescdw.com has been visited by 1M+ users in the past month
referalanswer.com has been visited by 10K+ users in the past month
trendsanswer.com has been visited by 100K+ users in the past month