Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.

part |2 pages

Section I: Evaluating and Measuring an Information Security Program

chapter 3|6 pages

The Culmination of ISRAM and GISAM

chapter 4|16 pages

KRI Security Baseline Controls

chapter 5|6 pages

History of the Standard

chapter 6|38 pages


part |2 pages

Section II: Analysis of ISO/IEC 17799:2005 (27002) Controls

chapter 7|8 pages

Security Policy

chapter 8|8 pages

Organization of Information Security

chapter 9|6 pages

Asset Management

chapter 10|8 pages

Human Resources Security

chapter 11|8 pages

Physical and Environmental Security

chapter 12|18 pages

Communications and Operations Management

chapter 13|12 pages

Access Control

chapter 15|4 pages

Information Security Incident Management

chapter 17|6 pages

Compliance with Legal Requirements