Information Security Governance Papers

Paper Title CAC/JTC1/SC27 - IT Security Techniques
The Abstract of The Paper Working Group 1: ""Information Security Management Systems""
WG 1 covers the development of ISMS (Information Security Management System, ISO/IEC 27001, ISO/IEC 27002) standards and guidelines family.
Working Group 2: ""Cryptography and Security Mechanisms""
WG 2 covers both cryptographic and non-cryptographic techniques and mechanism
Working Group 3: ""Evaluation Criteria of Information Security""
WG 3 covers IT Security evaluation and certification of IT systems, components, and products (such as Common Criteria for Evaluation). This will include consideration of computer networks, distributed systems, associated application services, etc.
Working Group 4: ""Security controls and services""
WG 4 covers the development and maintenance of standards and guidelines addressing services and applications supporting the implementation of control objectives and controls as defined in ISO/IEC 27001 (such as Network Security, CyberSecurity, Business Continuity, etc) .
Working Group 5: ""Identity Mgmt. & Privacy Technologies""
WG 5 covers the development and maintenance of standards and guidelines addressing security aspects of identity management, biometrics and the protection of personal data.
Web Link http://www.google.com.sa/search?hl=ar&safe=active&q=Information+Security+Governance+standards&btnG=%D8%A8%D8%AD%D8%AB%21&meta=&aq=f&oq=

Back To Information Security Governance Papers List

Database Sections