ISO/IEC 27000:2018(E) Information technology -Security techniques — Information security management systems-overviewand vocabulary
1 scope
This document provides the overview of information security management systems (1SMS). It alsoprovides terms and definitions commonly used in the ISMs family of standards. This document isapplicable to all types and sizes of organization (e.g.commercial enterprises, government agencies, not-for-profit organizations).
The terms and definitions provided in this document
- cover commonly used terms and definitions in the ISMS family of standards;
- do not cover all terms and definitions applied within the ISMS family of standards; and-do not limit the ISMS family of standards in defining new terms for use.
2Normative references
There are no normative references in this document.
3Terms and definitions
lS0 and IEC maintain terminological databases for use in standardization at the following addresses:- ISO online browsing platform: available at https://www.iso.org/obp
—IEC Electropedia: available at https:.//www.electropedia.org/
3.1
access control
means to ensure that access to assets is authorized and restricted based on business and securityrequirements ([3.56]
3.2
attack
attempt to destroy, expose, alter, disable, steal or gain unauthorized access to or make unauthorizeduse of an asset
3.3
audit
systematic, independent and documented process (3.54) for obtaining audit evidence and evaluating itobjectively to determine the extent to which the audit criteria are fulfilled文章源自标准下载网-https://www.biao-zhun.cn/118699.html
ISO/IEC 27000:2018(E) Information technology -Security techniques — Information security management systems-overviewand vocabulary
如果觉得本站不错,就请站长喝个咖啡吧,谢谢您的支持!