Meer Van Haren Publishing
Meer Van Haren Publishing in Boeken

Open information Security Management Maturity Model (O-ISM3) - eBook (9789087539115)

0
The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. In addition it supports common frameworks such as ISO 9000, ISO 27000, CO...

Verkopers met dit product

Sorry, dit product is momenteel niet beschikbaar

Anderen bekeken ook

Nieuw
TP-Link TL-SG1008P Gigabit PoE switch
TP-Link TL-SG1008P Gigabit PoE switch
TP-LINK Gigabit Smart Switch TL-SG2008 is equipped with 8 gigabit RJ45 ports. The switch provides high performance, enterprise-level QoS, useful security strategies and rich layer 2 management features. TP-LINK\'s 8-Port Gigabit Smart Switch TL-SG2008 is especially designed for the small and medium business networks that require efficient network management. TL-SG2008 comes with a comprehensive set of features, such as Link Aggregation Group, 802.1Q VLAN, Access Control Lists (ACL), Quality of Service(QoS L2 to L4), Storm Control and IGMP Snooping to provide a small or medium-sized business with a network that is geared for growth while ensuring performance and reliability. What\'s more, its easy-to-use web management interface means faster setup and configuration with less downtime, providing the ideal solution for your business network.
54,95
Nieuw
TP-Link TL-SG1008P Gigabit PoE switch
TP-Link TL-SG1008P Gigabit PoE switch
TP-LINK Gigabit Smart Switch TL-SG2008 is equipped with 8 gigabit RJ45 ports. The switch provides high performance, enterprise-level QoS, useful security strategies and rich layer 2 management features. TP-LINK\'s 8-Port Gigabit Smart Switch TL-SG2008 is especially designed for the small and medium business networks that require efficient network management. TL-SG2008 comes with a comprehensive set of features, such as Link Aggregation Group, 802.1Q VLAN, Access Control Lists (ACL), Quality of Service(QoS L2 to L4), Storm Control and IGMP Snooping to provide a small or medium-sized business with a network that is geared for growth while ensuring performance and reliability. What\'s more, its easy-to-use web management interface means faster setup and configuration with less downtime, providing the ideal solution for your business network.
54,95

Klanten-reviews van Open information Security Management Maturity Model (O-ISM3) - eBook (9789087539115)

Er zijn nog geen beoordelingen voor dit productBen jij de eerste die een review plaatst?

Meer over Open information Security Management Maturity Model (O-ISM3) - eBook (9789087539115)

Productomschrijving

The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. In addition it supports common frameworks such as ISO 9000, ISO 27000, COBIT and ITIL. Covers: risk management, security controls, security management and how to translate business drivers into security objectives and targets. All businesses need information security to protect our systems from the risk of threats. This Open Information Security Management Maturity Model (O-ISM3) supports information security practitioners in this fundamental task by covering the key areas required to minimise these threats: *Risk Management : identifying and estimating levels of exposure to the likelihood of loss and how to manage those risks of loss; *Security Controls : crafting the IT Security Policy which assures operations are as secure as they need to be; *Security Management : supporting the selection, maintenance, and overall Security Policy for the security controls deployed in a business enterprise. The O-ISM3 standard focuses on the common processes of information security. It is technology-neutral, very practical and considers the business aspect in depth. This means that practitioners can use O-ISM3 with a wide variety of protection techniques used in the marketplace. The distinctive benefits of O-ISM3 are: *A fully process-based approach It breaks information security management down into a comprehensive but manageable number of processes, with specifically relevant security control(s) being identified. In addition it covers the principles of continuous improvement that O-ISM3 supports. *Maturity coverage O-ISM3 defines information security management maturity in terms of the operation of an appropriate complementary set of ISM3 information security processes. *A business approach The coverage considers the business drivers and also the specific business challenges of outsourcing and partnering. The critical issue of how to translate key business objectives to security objectives and targets is covered in depth. *Compatibility with ISO 9000 Quality Management With similarities in structure and approach to quality management methods like ISO 9000, O-ISM3 also emphasises the practical and the measurable so that ISMSs can adapt without re-engineering in the face of changes to technology and risk. *Compatibility with ISO/IEC 27000 ISM3 is compatible in many ways with the ISO/IEC 27000:2009 standard, in addition provides a comprehensive framework for selecting, implementing, and managing a set of security processes to meet measurable business goals. *Compatibility with COBIT O-ISM3 implementations use a management responsibilities framework consistent with the ISACA COBIT framework model. *Compatibility with ITIL ITIL users can use the O-ISM3 process orientation to strengthen their ITIL security processes.

Productinformatie

    Productspecificaties

    Artikelnummer(s)
    EAN
    9789087539115
    Brand
    Van Haren Publishing
    Kenmerken
    Geschreven door
    The Open Group
    Taalversie
    Engels
    Bestandsformaat
    PDF
    Verschijningsdatum
    05/05/2011

    Verken gerelateerde categorieën

    Webshop.nl maakt gebruik van cookies. Ga je verder op onze website, ga dan akkoord met het plaatsen van cookies en de verwerking van deze data door ons en vermelde partners.