ISO 17799 Central. BS7799 and ISO17799 Guide

THE A-Z GUIDE FOR ISO27001 AND ISO27002 INFORMATION
ISO 27000 CENTRAL

ISO 27000 Central is intended to be a launch pad for those seeking help with this international standard. It offers information, tips, guides and links to a range of resources.

Menu
About ISO 27000
Starting Point
The Glossary
The PDCA Cycle
Certifications
Newsletter Archive

Home
Feedback
Forums
Conferences
Guestbook
Directory

Add ISO27000 Central
to Your Bookmarks


ISO27000 Glossary

This glossary of ISO 27000 and information security related terms was compiled over a lengthy period, and is provided as a public service. In addition to offering definitions and explanation of terms and phrases, the glossary also cross references each with the appropriate chapter of the standard itself, where applicable.

The ISO 27000 Glossary


The 27000 Glossary of Information Security Terms and Phrases

A   |   B   |   C   |   E   |   F   |   G   |   H   |   I   |   J   |   K   |   L   |   M   |   N   |   O   |   P   |   Q   |   R   |   S   |   T   |   U   |   V   |   W   |   X   |   Y   |   Z  ]


D


DATA CLASSIFICATION (Chapter 5)
This is the conscious decision to assign a level of sensitivity to data.

DATA ENCRYPTION (Chapter 10)
This is a means of 'scrambling' data so that is can only be read by those holding a 'key' (or password).

DECRYPTION (Chapter 10)
The process by which encrypted data is restored to its original form.

DENIAL OF SERVICE (DOS)
This is an internet attack against a Web site which results in, or is intended to result in, the user being denied normal service.

DES (Chapter 5)
This is the Data Encryption Standard: a data encryption standard used for the scrambling of data.

DIGITAL CERTIFICATE (Chapter 10)
This is basically the electronic version of an ID card. It establishes your 'credentials' and authenticates your connection when using the internet or a network.

DIGITAL SIGNATURE (Chapter 10)
This is an electronic equivalent of a persons signature, usually used to validates the authenticity of the sender of a message.

DMZ
Short for De-Militarised Zone, this is usually a separate part of an organisation's network, deliberately separate from the main corporate network/system in some way.

DONGLE
A device, usualyl physical, which is commonly used by developers to prevent unlicenced use of their software.





       SOURCES

ISO 27000 DOWNLOAD

ISO 27001 (and ISO 27002) should always be obtained from an official source.
17799

Standards Direct (BSI) provides the standard as an instant download from the following page: ISO 27000 Download

ISO27000
TOOLKIT

The standard (both ISO 27001 and 27002) can also be obtained as part of the ISO27000 Toolkit. This also comprises a series of support resources, such as aligned security policies, checklists, BIA questionnaires, presentations, etc.

It can be downloaded via the following website: ISO 27000 Toolkit

ADVERTISERS

Please feel free to contact us

Your Guide To ISO 27001 and ISO27002
Copyright © 2012. All Rights Reserved.