Course Hero Logo

Isoiec 27031 describes the concepts and ideas of

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 44 - 48 out of 64 pages.

ISO/IEC 27031Describes the concepts and ideas of records andcommunication technology (ICT) readiness for businesscontinuity, and gives a framework of strategies and approachesto pick out and specify all elements for improving an enterprise'sICT readiness to make sure business continuity.Encompasses all occasions and incidents (which includessecurity associated) that could have an impact on ICTinfrastructure and systems.ISO/IEC 27032Gives steering for improving the country of Cyber security,drawing out the particular components of that hobby and itsdependencies on other safety domain names, mainly:records protection,network safety,net security, andCrucial facts infrastructure safety (CIIP).Activity 4: Identify core components and implementation tiers of the frameworkaccording to organisational requirements.
This part of the activity requires you to identify core components and implementation tiers ofthe framework according to organisational requirements and document the outcomes using‘Template 4’.DescriptionoftheactivityThis activity is a continuation of Activity 3.This activity requires you to identify core components and implementation tiers of theframework according to organisational requirements based on the information provided in thecase study.To do so you need to:Identify the core components of the framework according to organisationalrequirements and document using template 5.Identify the below four (4) implementation tiers of the framework according toorganisational requirements and document using Template 5:oTier 1 – PartialoTier 2 – Risk-InformedoTier 3 – RepeatableoTier 4 – Adaptive
Template 4: Core components and implementation tiers of the framework according toorganisational requirements.
_v1Core components of cyber security framework (150-200 words)1Identify goals:This element is used to decide the cyber-security goals that a enterprise need to gain. Eachorganization's identified dreams might be precise. Includes figuring out an agency’sessential capabilities and what cyber-security dangers should disrupt the ones capabilities.Additionally, detecting contemporary dangers, existing virtual property, and organizationalroles are all crucial factors of this step.Set guidelineIn this step of a cyber-security framework, a complete description of activities, tactics, andmovements that serve to fulfill the dreams outlined inside the identification level is set up.This stage need to also include techniques for prioritizing desires as well as defining rolesand obligations for every established aim.Implement:This is the framework's movement degree whilst every aim is applied inside the agencyinfrastructure. Because carried out cyber-security methods occasionally include numerousareas or departments and conversation is crucial at this stage.

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 64 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Winter
Professor
NoProfessor
Tags
Information Security, Computer Security, Cloud Security Alliance, Collaborative Security Intelligence

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture