{"id":434134,"date":"2024-10-20T07:42:30","date_gmt":"2024-10-20T07:42:30","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iso-iec-270322023\/"},"modified":"2024-10-26T14:37:41","modified_gmt":"2024-10-26T14:37:41","slug":"bs-iso-iec-270322023","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iso-iec-270322023\/","title":{"rendered":"BS ISO\/IEC 27032:2023"},"content":{"rendered":"
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 4 Abbreviated terms <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5 Relationship between Internet security, web security, network security and cybersecurity <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6 Overview of Internet security <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7 Interested parties 7.1 General <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.2 Users <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.3 Coordinator and standardization organisations 7.4 \u200bGovernment authorities 7.5 \u200bLaw enforcement agencies 7.6 Internet service providers <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8 Internet security risk assessment and treatment 8.1 General 8.2 Threats <\/td>\n<\/tr>\n | ||||||
20<\/td>\n | 8.3 Vulnerabilities 8.4 Attack vectors <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | 9 Security guidelines for the Internet 9.1 General <\/td>\n<\/tr>\n | ||||||
22<\/td>\n | 9.2 Controls for Internet security 9.2.1 General 9.2.2 Policies for Internet security 9.2.3 Access control <\/td>\n<\/tr>\n | ||||||
23<\/td>\n | 9.2.4 Education, awareness and training 9.2.5 Security incident management <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | 9.2.6 Asset management 9.2.7 Supplier management <\/td>\n<\/tr>\n | ||||||
26<\/td>\n | 9.2.8 Business continuity over the Internet 9.2.9 Privacy protection over the Internet <\/td>\n<\/tr>\n | ||||||
27<\/td>\n | 9.2.10 Vulnerability management <\/td>\n<\/tr>\n | ||||||
28<\/td>\n | 9.2.11 Network management <\/td>\n<\/tr>\n | ||||||
29<\/td>\n | 9.2.12 Protection against malware 9.2.13 Change management <\/td>\n<\/tr>\n | ||||||
30<\/td>\n | 9.2.14 Identification of applicable legislation and compliance requirements 9.2.15 Use of cryptography 9.2.16 Application security for Internet-facing applications <\/td>\n<\/tr>\n | ||||||
32<\/td>\n | 9.2.17 Endpoint device management 9.2.18 \u200bMonitoring <\/td>\n<\/tr>\n | ||||||
33<\/td>\n | Annex A (informative) Cross-references between this document and ISO\/IEC 27002 <\/td>\n<\/tr>\n | ||||||
35<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Cybersecurity. Guidelines for Internet security<\/b><\/p>\n |