BS ISO/IEC 27032:2012 PDF Download
Standard EN SampleInformation technology. Security techniques. Guidelines for cybersecurity
Also Known As:
Cyberspace is a complex environment consisting of interactions between people, software and services. Supported by the worldwide distribution of information and communication technology devices and networks, it presents endless advantages to the user. However the online environment may not always be safe.
That’s why we’ve published BS ISO/IEC 27032:2012 Information technology — Security techniques — Guidelines for cybersecurity which seeks to address security gaps arising from a lack of communication between the different users and providers of cyberspace.
It tackles any risks not covered by current Internet, network and information and communication technology security.
This International Standard provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains. In particular it focuses on information security, network security, internet security and critical information infrastructure protection (CIIP).
BS ISO/IEC 27032:2012 provides readers with:
— General overview of cybersecurity
— Explanation of the relationship between cybersecurity and other types of security
— Definition of stakeholders and a description of their roles in cybersecurity
— Guidance for addressing common cybersecurity issues, and
— Framework to enable stakeholders to collaborate on resolving cybersecurity issues.
This International Standard is applicable to providers of services in the Cyberspace. The audience, however, includes the consumers that use these services. Where organizations provide services in the Cyberspace to people for use at home or other organizations, they may need to prepare guidance based on this International Standard that contains additional explanations or examples sufficient to allow the reader to understand and act on it.
Contents
1 Scope
2 Applicability
3 Normative references
4 Terms and definitions
5 Abbreviated terms
6 Overview
7 Stakeholders in the Cyberspace
8 Assets in the Cyberspace
9 Threats against the security of the Cyberspace
10 Roles of stakeholders in Cybersecurity
11 Guidelines for stakeholders
12 Cybersecurity controls
13 Framework of information sharing and coordination
Annexes
Bibliography
Descriptors | Data processing, Safety, Safety devices, Information transfer, Security, Internet |
ICS Codes | 35.030 - IT Security |
Language(s) | English |
ISBN | 978 0 580 59489 2 |
File Size | 1.8 MB |