ISO 17799 Central. BS7799 and ISO17799 Guide

THE A-Z GUIDE FOR ISO27001 AND ISO27002 INFORMATION
ISO 27000 CENTRAL

ISO 27000 Central is intended to be a launch pad for those seeking help with this international standard. It offers information, tips, guides and links to a range of resources.

Menu
About ISO 27000
Starting Point
The Glossary
The PDCA Cycle
Certifications
Newsletter Archive

Home
Feedback
Forums
Conferences
Guestbook
Directory

Add ISO27000 Central
to Your Bookmarks


ISO27000 Glossary

This glossary of ISO 27000 and information security related terms was compiled over a lengthy period, and is provided as a public service. In addition to offering definitions and explanation of terms and phrases, the glossary also cross references each with the appropriate chapter of the standard itself, where applicable.

The ISO 27000 Glossary


The 27000 Glossary of Information Security Terms and Phrases

A   |   B   |   D   |   E   |   F   |   G   |   H   |   I   |   J   |   K   |   L   |   M   |   N   |   O   |   P   |   Q   |   R   |   S   |   T   |   U   |   V   |   W   |   X   |   Y   |   Z  ]


C


CERT
The Computer Emergency Response Team (CERT) is generally recognised as the internet's official emergency team.

CERTIFICATION AUTHORITY (Chapter 10)
A trusted third party 'clearing house' that issues digital signatures and digital certificates.

CIPHER (Chapter 10)
A cipher is the generic term used to describe a means of encrypting data or information.

CLEAR DESK POLICY
The policy of an organisation which instructs personnel to clear their desks at the end of each day.

COMPUTER VIRUS (Chapter 8)
Computer Viruses comprise programming code which is purposely written to inflict an unexpected result upon third party.

CIA
Confidentiality, Integrity and Availability (CIA) are often considered to be the three basics of information security.

CONTINGENCY PLANNING (Chapter 11)
Contingency planning is the process of planning for the unexpected or perhaps the possibility of circumstances changing.

COPY PROTECTION
These term is commonly used to describe techniques used by software developers to help prevent illegal use of products.

CRACKER
A cracker is either a person who attempts to gain unauthorised access to a computer system., or a program used to 'crack' some code (to reveal perhaps a password).

CYBERCRIME
This is an activity which uses network access to commit a criminal act.



       SOURCES

ISO 27000 DOWNLOAD

ISO 27001 (and ISO 27002) should always be obtained from an official source.
17799

Standards Direct (BSI) provides the standard as an instant download from the following page: ISO 27000 Download

ISO27000
TOOLKIT

The standard (both ISO 27001 and 27002) can also be obtained as part of the ISO27000 Toolkit. This also comprises a series of support resources, such as aligned security policies, checklists, BIA questionnaires, presentations, etc.

It can be downloaded via the following website: ISO 27000 Toolkit

ADVERTISERS

Please feel free to contact us

Your Guide To ISO 27001 and ISO27002
Copyright © 2012. All Rights Reserved.