arrowHome arrow Articole Complete arrow eWorld vs Information Risk Management
Main Menu
Home
Harta Site
Cauta in site
Termeni si Conditii
Date Contact
Business Corner
Solutii BUSINESS
Despre Mine si Site
Managementul Riscului
Analize, Cercetari, Studii
Dictionar
Instrumente
Tutoriale
Video Tutoriale
Articole Complete
Locuri de munca
Metodologii
Octave
ITIL
COBIT
Microsoft
PMI PMBOK
Mehari
The Orange Book
FMEA
Prince2
Riskit
Risk IT (ISACA)
Articole domenii conexe
Securitate IT
GIS
Business Intelligence
Digital Economy
Social Media
Stiri
Dezvoltare profesionala
Instruire / Training
Evenimente
De interes academic
eAgora



Risk Management pe LinkedIn

Ultimele Comentarii
RSS
Drepturi de Autor


Licenţa Creative Commons


Designed by:
SiteGround web hosting Joomla Templates
Vizitati-ma pe LinkedIn  Vizitati-ma pe Facebook  Urmariti-ma pe Twitter  RSS
Poate te intereseaza si ...
eWorld vs Information Risk Management E-mail
Approaches for identifying and analyzing the main risks that the use of informational technologies in business processes involves are also found in the different standards, methodologies and best practices adopted regarding the informational technology security management.
By using these approaches the ability to understand IT services and processes is enriched. Also, they can use new information control instruments. These standards handle, among other things, the identification of unauthorized network access, unauthorized access to confidential messages, identification of loss of electronic transaction integrity, of shortages in data confidentiality, of viruses etc.
We will not go into detail in the presentation of these standards, but we will only mention the most important ones:
- COBIT - Control Objectives for Information and related Technology),
- ITIL – Infrastructure Library IT,
- ISO/IEC 17799:2000 – the practice code in Informational Security Management, an international standard based on BS 7799-1,
- ISO/IEC TR 13335 - Information Technology -Guidelines for the Management of IT Security,
- ISO/IEC 15408 – Security Techniques- assessment criteria for informational technology security, TickIT,
- NIST 800 - 14 –Generally accepted principles and practices in Informational technology security,
- COSO – Integrated work plan, report of the Committee of Sponsoring Organizations of the Treadway Commission (COSO)
Citiţi articolul complet mai jos.





Digg!Reddit!Del.icio.us!Google!Live!Facebook!Slashdot!Netscape!Technorati!StumbleUpon!Newsvine!Furl!Yahoo!Ma.gnolia!Free social bookmarking plugins and extensions for Joomla! websites!
 

Adaugă comentariu

Ne permitem sa selectam mesajele care vor fi publicate.
Va multumim pentru intelegere!


Codul de securitate
Actualizează

< Precedent   Urmator >
Solutii BUSINESS

Consultanţă & Training

Managementul-Riscurilor.ro
Aparitii in presa
Ce este managementul riscului?
Inovatia nu este totul
Risk in an economy under stress
Managementul riscului si dominoul crizei







Parteneri
- DeepSec Blog
- Proceduri ISO
- PM Expert
- eSimi
Statistici Site


Page Rank Check

top of page

http://www.managementul-riscurilor.ro, Powered by Joomla! and designed by SiteGround reseller hosting