ISO 27002 was originally named ISO/IEC 1779, and published in
2000
. It was updated in 2005, when it was accompanied by the newly published ISO 27001. The two standards are intended to be used together, with one complimenting the other.
When was ISO 27002 standard first proposed several countries?
It was feared it would lead to government intrusion into business matters. When the ISO 27002 standard was first proposed, several countries, including the United States, Germany, and Japan,
refused to adopt it
, claiming that it had fundamental problems; which of the following is NOT one of them?
What is the ISO 27002 standard?
ISO/IEC 27002:2013 gives
guidelines for organizational information security standards and information security management practices
including the selection, implementation and management of controls taking into consideration the organization’s information security risk environment(s).
What is the information security principle that requires significant task to be split up so that more than one individual is required to complete them?
Separation of duties
is the principle by which members of the organization can access the minimum amount of information for the minimum amount of time necessary to perform their required duties.
What is the information security principle that requires?
The basic tenets of information security are
confidentiality, integrity and availability
. Every element of the information security program must be designed to implement one or more of these principles. Together they are called the CIA Triad.
What is the latest ISO 27002 standard?
ISO/IEC 27002, the most recent of which is
ISO 27002:2013
, has a close association with ISO 27001. Broadly speaking, it gives guidance on the implementation of ISO 27001.
What is the difference between ISO 27001 and ISO 27002?
Basically,
ISO 27001 sets forth the compliance requirements needed to become certified
. In contrast, ISO 27002 is a set of guidelines that are designed to help you introduce and implement ISMS best practices. Here’s a simpler analogy, ISO 27002 is like a guidebook or a practice test.
Why is ISO 27002 important?
ISO 27002 serves
as a guidance document
, providing best-practice guidance on applying the controls listed in Annex A of ISO 27001. … This provides independent, expert assurance that information security is managed in line with international best practice.
What does ISO 27002 do?
What is ISO 27002? ISO 27002 is a
supplementary standard that focuses on the information security controls that organisations might choose to implement
. These controls are listed in Annex A of ISO 27001, which is what you’ll often see information security experts refer to when discussing information security controls.
Is ISO 27002 a framework?
In practice, most organizations that adopt ISO/IEC 27001 also use Annex A and hence ISO/IEC 27002
as a general framework or structure for their controls
, making various changes as necessary to suit their specific information risk treatment requirements.
What are the key principles on which access control is founded?
Answer: Access control is built on several key principles, including least privilege,
need to know, and separation of duties
.
What are the 3 components of information security?
The CIA triad refers to an information security model made up of the three main components:
confidentiality, integrity and availability
.
What is integrity in cyber security?
The term ‘integrity’ means
guarding against improper information modification or destruction
, and includes ensuring information non-repudiation and authenticity.
What are the eight principles of security?
- Principle of Least Privilege. …
- Principle of Fail-Safe Defaults. …
- Principle of Economy of Mechanism. …
- Principle of Complete Mediation. …
- Principle of Open Design. …
- Principle of Separation of Privilege. …
- Principle of Least Common Mechanism. …
- Principle of Psychological Acceptability.
What are the key principles of security?
- Confidentiality: The degree of confidentiality determines the secrecy of the information. …
- Authentication: Authentication is the mechanism to identify the user or system or the entity. …
- Integrity: …
- Non-Repudiation: …
- Access control: …
- Availability:
What are the five goals of information security governance?
- Establish organizationwide information security. …
- Adopt a risk-based approach. …
- Set the direction of investment decisions. …
- Ensure conformance with internal and external requirements. …
- Foster a security-positive environment for all stakeholders.