Chapter | Title |
ONE | INFORMATION SECURITY ORGANIZATION |
Information Security Policy Information Security policy Information Security Organization Independent Review of Information Security Policy
| |
TWO | CLASSIFYING INFORMATION AND DATA |
Defining Information
| |
THREE | CONTROLLING ACCESS TO INFORMATION AND SYSTEMS |
Managing Access Control Standards
| |
FOUR | PROCESSING INFORMATION AND DOCUMENTS |
Configuring Networks System Operations and Administration Appointing System Administrators E-mail and the Worldwide Web Downloading Files and Information from the Internet Telephones & Fax Making Conference Calls Data Management Transferring and Exchanging Data Backup, Recovery and Archiving Restarting or Recovering your System
| |
FIVE | PURCHASING AND MAINTAINING COMMERCIAL SOFTWARE |
| |
SIX | SECURING HARDWARE, PERIPHERALS AND OTHER EQUIPMENT |
| |
SEVEN | COMBATING CYBER CRIME |
| |
EIGHT | CONTROLLING E-COMMERCE INFORMATION SECURITY |
| |
NINE | DEVELOPING AND MAINTAINING IN-HOUSE SOFTWARE |
| |
TEN | DEALING WITH PREMISES RELATED CONSIDERATIONS |
| |
ELEVEN | ADDRESSING PERSONNEL ISSUES RELATING TO SECURITY |
| |
TWELVE | DELIVERING TRAINING AND STAFF AWARENESS |
| |
THIRTEEN | COMPLYING WITH LEGAL AND POLICY REQUIREMENTS |
| |
FOURTEEN | DETECTING AND RESPONDING TO IS INCIDENTS |
| |
FIFTEEN | PLANNING FOR BUSINESS CONTINUITY |
|
From : www.27001-online.com