Isms Notes
Isms Notes
Isms Notes
INFORMATION SECURITY
MANAGEMENT SYSTEM
ISO-27001:2013
PRE-COURSE MATERIAL
Scope:
ISO-27001 specifies the requirements for establishing, implementing, maintaining and
continually improving an information security management system within the context of the
organization. Information Security Management System covers various information assets
that are received, maintained, communicated, processed, stored by the organization.
For the implementation of ISMS, we need to understand the following Terms & Definitions:
Management system:
Organization:
Person or group of people that has its own functions with responsibilities, authorities,
accountabilities and relationships to achieve its objectives
Top management:
Person or group of people who directs and controls an organization at the highest level
Interested party:
Person or organization that can affect, be affected by, or perceive itself to be affected by a
decision or activity
Objective:
Result to be achieved
Competence:
Ability to apply knowledge and skills to achieve intended results
Document:
NOTE The medium can be paper, magnetic, electronic or optical computer disc, photograph
or master sample, or a combination thereof.
Documented information:
Process:
Set of interrelated or interacting activities which transforms inputs into outputs
Audit:
PRE-COURSE MATERIAL
Systematic, independent and documented process for obtaining audit evidence and
evaluating it
objectively to determine the extent to which the audit criteria are fulfilled
Conformity:
Fulfillment of a requirement
Nonconformity:
Non-fulfillment of a requirement
Corrective action:
Action to eliminate the cause of a non-conformity and to prevent recurrence
Effectiveness:
Extent to which planned activities are realized and planned results achieved
Indicator:
Measurable representation of the condition or status of operations, management or
conditions
Performance:
Measurable result
Plan: establish the objectives of the system and its processes, and the resources needed
to deliver
results in accordance with customers requirements and the organizations policies, and
identify
and address risks and opportunities;
Check: monitor and (where applicable) measure processes and the resulting products
and services
against policies, objectives, requirements and planned activities, and report the results;
Act: take actions to improve performance, as necessary.
Risk:
Effect of uncertainty
Continual Improvement:
Procedure:
Record:
PRE-COURSE MATERIAL
Document stating results achieved or providing evidence of activities performed
Access control
means to ensure that access to assets is authorized and restricted based on business and
security requirements
Attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make un
authorized use of an asset
Availability
Competence
Confidentiality
Conformity
Consequence
Control
Correction
Corrective action
Data
collection of values assigned to base measures (2.10), derived measures (2.22) and/or
indicators (2.30)
External context
Information security
processes (2.61) and procedures for ensuring continued information security (2.33)
operations
processes (2.61) for detecting, reporting, assessing, responding to, dealing with, and learning
from information security incidents (2.36)
Integrity
Interested party
person or organization (2.57) that can affect, be affected by, or perceive themselves to be
affected by a decision or activity
Level of risk
magnitude of a risk (2.68) expressed in terms of the combination of consequences (2.14) and
their likelihood (2.45)
Likelihood
Monitoring
Nonconformity
Policy
Residual risk
Risk acceptance
Risk analysis
process to comprehend the nature of risk (2.68) and to determine the level of risk (2.44)
Risk assessment
overall process (2.61) of risk identification (2.75), risk analysis (2.70) and risk evaluation
(2.74)
Risk criteria
Risk evaluation
process (2.61) of comparing the results of risk analysis (2.70) with risk criteria (2.73) to
determine whether the risk (2.68) and/or its magnitude is acceptable or tolerable
PRE-COURSE MATERIAL
Risk identification
Risk owner
person or entity with the accountability and authority to manage a risk (2.68)
Risk treatment
Stakeholder
person or organization that can affect, be affected by, or perceive themselves to be affected
by a decision or activity
Threat
Vulnerability
weakness of an asset or control (2.16) that can be exploited by one or more threats (2.83)