Quantcast
Channel: ERDAL OZKAYA - ISO 27001/20000
Browsing all 10 articles
Browse latest View live

ISO/IEC 27000:2009 Information technology

 The scope of ISO/IEC 27000 is “to specify the fundamental principles, concepts and vocabulary for the ISO/IEC 27000 (information security management system) series of documents.”ISO/IEC 27000 contains...

View Article



Image may be NSFW.
Clik here to view.

SECURITY MANAGEMENT

To protect an organisation's IT infrastructure and information, security management procedures should adopted. At a minimum an organisation should adopt he recommendations below.FirewallUse a firewall....

View Article

ISO 27005 Risk Managment

ISO/IEC 27005:2011 Information technology — Security techniques — Information security risk management (second edition)Abstract from the 2008 1st edition: “ISO/IEC 27005 provides guidelines for...

View Article

Image may be NSFW.
Clik here to view.

ISO/IEC 27001:2005 Information technology

Source : IsecT Ltd. ISO/IEC 27001 is the formal set of specifications against which organizations may seek independent certification of their Information Security Management System (ISMS).ISO/IEC 27001...

View Article

Image may be NSFW.
Clik here to view.

PDCA in ISO27001

The plan, do, check and act cycle (PDCA)Plan (establishing the ISMS): Establish the policy, the ISMS objectives, processes and procedures related to risk management and the improvement of information...

View Article


Image may be NSFW.
Clik here to view.

What is in ISO27001?

What is in the ISO27001 standard?The ISO27001 information security standard is the one standard amongst the ISO27000 family of standards against which an organisation’s ISMS can be audited and...

View Article

ISO27001 ToolKit

The FREE ISO27k Toolkit consists of a collection of ISMS-related materials contributed by members of the ISO27k Forum, either individually or through collaborative working groups organized on the...

View Article

Image may be NSFW.
Clik here to view.

Australian Banking Security (!)

Online Security is getting every day more and more important. It’s so common these days to implement secure password policies, which is at least 8 characters, with minimum 1 special character like @$#...

View Article


Image may be NSFW.
Clik here to view.

Getting hacked by colour

A hacking anatomy and what we can learn out of it!There is nearly no single week , we don’t read in the news that there is a attack launched against a government, business or organization. As we all...

View Article


Checklist of ISO 27001 Mandatory Documentation

Here is a very good Post from the Pen Test Magazine, which i would like to share with youIt is our pleasure to announce we are offering another document for free download - a white paper called...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images