Requirements and Security Assessment include:
~ Building and maintaining a secure network
~ Protecting cardholder data
~ Maintaining a vulnerability management program
~ Implementing strong access control measures
~ Regularly monitoring and testing networks
~ Maintaining an information security policy
Cyber Security Based on ISO:
~ Introduction as to what is information security and security in general
~ Risk Assessment and Treatment
~ Security Policy
~ Organization of Information Security (internal organization and external
parties)
~ and more (find out more in the tabs below)
Asset Management: responsibility for assets and information classification
Human Resources Security: prior to employment, during employment, and termination or change of employment
Physical and Environmental Security: secure areas and equipment security
This consists of:
~ Operational procedures and responsibilities
~ Third party service delivery management
~ System planning and acceptance
~ Protection against malicious ad mobile code
~ Back-up
~ Network security management
~ Media handling
~ Exchange of information
~ Electronic commerce services
~ Monitoring
This consists of:
~ Business requirement for access control
~ User access management and responsibilities
~ Network access control
~ Operating system access control
~ Application and information access control
~ Mobile computing and teleworking
~ Security requirements of information systems
~ Correct processing in applications
~ Cryptographic controls
~ Security of system files
~ Security in development and support processes
~ Technical vulnerability management
This consists of:
~ Information Security Incident Management
~ Reporting information security events and weaknesses
~ Management of information security incidents and improvements
~ Business Continuity Management
~ Information security aspects of business continuity management
~ Compliance
~ Compliance with legal requirements
~ Compliance with security policies and standards, and technical compliance ~ Information systems audit considerations
This page was created with Mobirise