[精选]国际信息安全技术标准发展(英文版)13284.pptx
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_1.gif)
![资源得分’ title=](/images/score_05.gif)
《[精选]国际信息安全技术标准发展(英文版)13284.pptx》由会员分享,可在线阅读,更多相关《[精选]国际信息安全技术标准发展(英文版)13284.pptx(20页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、国际信息安全技术标准发展国际信息安全技术标准发展 ISO/IEC JTC 1/SC 27/WG 4江明灶江明灶 Meng-Chow Kang,CISSP,CISAMeng-Chow Kang,CISSP,CISAConvener,Security Controls&Services Working Group(WG 4),Convener,Security Controls&Services Working Group(WG 4),ISO/IEC JTC 1 SC 27(Security Techniques)ISO/IEC JTC 1 SC 27(Security Techniques)Ch
2、ief Security AdvisorChief Security AdvisorMicrosoft Great China RegionMicrosoft Great China RegionWG1 ISMS StandardsChair Ted HumphreysVice-Chair Angelika PlateWG4 Security Controls&ServicesChair Meng-Chow KangWG2Security TechniquesChair Prof.K NaemuraWG3Security EvaluationChair Mats OhlinWG5Privacy
3、 Technology,ID management and BiometricsChair Kai RannenbergISO/IEC JTC 1 SC 27ISO/IEC JTC 1 SC 27Chair Walter FumyChair Walter FumyVice Chair Marijike de SoeteVice Chair Marijike de SoeteSecretary Krystyna PassiaSecretary Krystyna Passia2700027000Fundamental&Fundamental&VocabularyVocabulary27004270
4、04ISMS ISMS MeasurementMeasurement2700527005ISMS Risk ISMS Risk ManagementManagement2700627006Accreditation Accreditation RequirementsRequirements2700127001ISMS RequirementsISMS Requirements2700327003ISMS ISMS Implementation Implementation GuidanceGuidanceInformation Security Management Systems(ISMS
5、)2700227002Code of PracticeCode of PracticeISMSFamilyRisk manage;Prevent occurrence;Risk manage;Prevent occurrence;Risk manage;Prevent occurrence;Reduce impact of occurrenceReduce impact of occurrenceReduce impact of occurrencePrepare to respond;eliminate or Prepare to respond;eliminate or Prepare t
6、o respond;eliminate or reduce impactreduce impactreduce impactSC27 WG4 Roadmap FrameworkInvestigate to establish facts Investigate to establish facts Investigate to establish facts about breaches;identify who about breaches;identify who about breaches;identify who done it and what went wrongdone it
7、and what went wrongdone it and what went wrongUnknown and emerging security issuesKnown security issuesSecurity breaches and compromisesNetwork Security(27033)Network Security(27033)Network Security(27033)TTP Services SecurityTTP Services SecurityTTP Services SecurityICT Readiness for Business ICT R
8、eadiness for Business ICT Readiness for Business Continuity(27031)Continuity(27031)Continuity(27031)SC27 WG4 RoadmapApplication Security(27034)Application Security(27034)Application Security(27034)Forensic InvestigationForensic InvestigationForensic InvestigationCybersecurity(27032)Cybersecurity(270
9、32)Cybersecurity(27032)Includes ISO/IEC 24762,Vulnerability Mgmt,IDS,&Incident Response related standardsAnti-Spyware,Anti-SPAM,Anti-Phishing,Cybersecurity-event coordination&information sharingISO 18028 revision;WD for new Part 1,2&3;New Study Period on Home Network Security1st WD available for com
10、mentsFuture NPNew Study Period proposed;Includes outsourcing and off-shoring securityGaps between Readiness&ResponseIT Security,BCP,and DRP Planning&ExecutionIT Security,BCP,and DRP Planning&ExecutionProtectDetectReact/ResponseIT Security PlanningActivateBCPActivate DCRPPlanPrepare&TestPlanPrepare&T
11、estBusiness Continuity PlanningDisaster Contingency&Recovery PlanningDisasterEventsIT SystemsFailuresICT Readiness for Business Continuity What is ICT Readiness?What is ICT Readiness?Prepare organization ICT technology(infrastructure,operation,Prepare organization ICT technology(infrastructure,opera
12、tion,applications),process,and people against unforeseeable focusing applications),process,and people against unforeseeable focusing events that could change the risk environmentevents that could change the risk environment Leverage and streamline resources among traditional business Leverage and st
13、reamline resources among traditional business continuity,disaster recovery,emergency response,and IT security continuity,disaster recovery,emergency response,and IT security incident response and managementincident response and management Why ICT Readiness focus on Business Continuity?Why ICT Readin
14、ess focus on Business Continuity?ICT systems are prevalent in organizationsICT systems are prevalent in organizations ICT systems are necessary to support incident,business continuity,ICT systems are necessary to support incident,business continuity,disaster,and emergency response and management nee
15、dsdisaster,and emergency response and management needs Business continuity is incomplete without considering ICT systems Business continuity is incomplete without considering ICT systems readinessreadiness Responding to security incident,disasters,and emergency situations Responding to security inci
16、dent,disasters,and emergency situations are about business continuityare about business continuityImplications of ICT ReadinessOperational StatusTimeIncidentCurrent IHM,BCM and DRP focus on shortening period of disruption and reducing the impact of an incident by risk mitigation and recovery plannin
17、g.T=0T=iT=kT=lT=j100%x%y%z%Early detection and response capabilities to prevent sudden and drastic failure,enable gradual deterioration of operational status and further shorten recovery time.Before implementation of IHM,BCM,and/or DRPAfter implementation of IHM,BCM,and/or DRPAfter implementation of
18、 ICT Readiness for BCICT Readiness for Business Continuity Re-proposed as single-part standard(Nov 07)Re-proposed as single-part standard(Nov 07)Structure(DRAFT,Document SC27N6274)Structure(DRAFT,Document SC27N6274)IntroductionIntroduction ScopeScope Normative ReferencesNormative References Terms an
19、d DefinitionsTerms and Definitions Overview(of ICT Readiness for Business Continuity)Overview(of ICT Readiness for Business Continuity)ApproachApproach Based on PDCA cyclical modelBased on PDCA cyclical model Extend BCP approachExtend BCP approach (using RA,and BIA)(using RA,and BIA)Introduce Failur
20、e Scenario Assessment(withIntroduce Failure Scenario Assessment(with FM FMEA)EA)Focus on Triggering EventsFocus on Triggering Events Management of IRBC ProgramManagement of IRBC ProgramP2P File SharingP2P File SharingP2P File SharingInstant Instant Instant MessagingMessagingMessagingBloggingBlogging
21、BloggingWeb 2.0 Cybersecurity IssuesSplogs,SPAM,Splogs,SPAM,Search Engine Search Engine PoisoningPoisoningSpywareSpywareTrojansTrojansVirus/WormsVirus/WormsSPAMSPAMExploit URLsExploit URLsPhishingPhishingTrojansTrojansVoIP/VideoVoIP/VideoVoIP/VideoPrivacy&Privacy&Information Information BreachBreach
22、Global Threat LandscapePrevalence of Malicious Software by CategoryWhat is Cybersecurity Definition of Cybersecurity overlaps Definition of Cybersecurity overlaps Internet/network securityInternet/network security Nature Cybersecurity issuesNature Cybersecurity issues Occurs on the Internet(Cyberspa
23、ce)Occurs on the Internet(Cyberspace)Global nature,multiple countries,different policy and Global nature,multiple countries,different policy and regulations,different focusregulations,different focus Multiple entities,simple client system to complex Multiple entities,simple client system to complex
24、infrastructureinfrastructure Weakest link and lowest common denominator prevailWeakest link and lowest common denominator prevail Highly creative landscape always changingHighly creative landscape always changingCybersecurity Cybersecurity concerns the protection of assets Cybersecurity concerns the
25、 protection of assets belonging to both organizations and users in the belonging to both organizations and users in the cyber environment.cyber environment.The cyber environment in this context is defined as The cyber environment in this context is defined as the public on-line environment(generally
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 精选 国际 信息 安全技术 标准 发展 英文 13284
![提示](https://www.taowenge.com/images/bang_tan.gif)
限制150内