• BS ISO/IEC 27032:2012

    Superseded A superseded Standard is one, which is fully replaced by another Standard, which is a new edition of the same Standard.

    Information technology. Security techniques. Guidelines for cybersecurity

    Available format(s):  Hardcopy, PDF

    Superseded date:  28-06-2023

    Language(s):  English

    Published date:  31-07-2012

    Publisher:  British Standards Institution

    Add To Cart

    Table of Contents - (Show below) - (Hide below)

    Foreword
    Introduction
    1 Scope
    2 Applicability
    3 Normative references
    4 Terms and definitions
    5 Abbreviated terms
    6 Overview
    7 Stakeholders in the Cyberspace
    8 Assets in the Cyberspace
    9 Threats against the security of the Cyberspace
    10 Roles of stakeholders in Cybersecurity
    11 Guidelines for stakeholders
    12 Cybersecurity controls
    13 Framework of information sharing and coordination
    Annex A (informative) - Cybersecurity readiness
    Annex B (informative) - Additional resources
    Annex C (informative) - Examples of related documents
    Bibliography

    Abstract - (Show below) - (Hide below)

    Specifies guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular: - information security, - network security, - internet security, and - critical information infrastructure protection (CIIP).

    Scope - (Show below) - (Hide below)

    This International Standard provides guidance for improving the state of Cybersecurity, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular:

    • information security,

    • network security,

    • internet security, and

    • critical information infrastructure protection (CIIP).

    It covers the baseline security practices for stakeholders in the Cyberspace. This International Standard provides:

    • an overview of Cybersecurity,

    • an explanation of the relationship between Cybersecurity and other types of security,

    • a definition of stakeholders and a description of their roles in Cybersecurity,

    • guidance for addressing common Cybersecurity issues, and

    • a framework to enable stakeholders to collaborate on resolving Cybersecurity issues.

    General Product Information - (Show below) - (Hide below)

    Committee IST/33/4
    Development Note Supersedes 11/30168516 DC. (08/2012)
    Document Type Standard
    Publisher British Standards Institution
    Status Superseded
    Superseded By
    Supersedes

    Standards Referenced By This Book - (Show below) - (Hide below)

    BS 11200:2014 Crisis management. Guidance and good practice
    13/30274342 DC : 0 BS 11200 - CRISIS MANAGEMENT - GUIDANCE AND GOOD PRACTICE
    16/30342526 DC : 0 BS 31111 - CYBER RISK AND RESILIENCE - GUIDE

    Standards Referencing This Book - (Show below) - (Hide below)

    ISO/IEC 27001:2013 Information technology — Security techniques — Information security management systems — Requirements
    ISO/IEC 29147:2014 Information technology Security techniques Vulnerability disclosure
    ISO/IEC 27035:2011 Information technology Security techniques Information security incident management
    ISO 31000:2009 Risk management Principles and guidelines
    ISO/IEC 27031:2011 Information technology Security techniques Guidelines for information and communication technology readiness for business continuity
    ISO/IEC 27002:2013 Information technology Security techniques Code of practice for information security controls
    ISO/IEC 27010:2015 Information technology Security techniques Information security management for inter-sector and inter-organizational communications
    ISO/IEC 19770-1:2012 Information technology Software asset management Part 1: Processes and tiered assessment of conformance
    ISO/IEC 20000-1:2011 Information technology Service management Part 1: Service management system requirements
    ISO/IEC TR 19791:2010 Information technology Security techniques Security assessment of operational systems
    ISO/IEC 27005:2011 Information technology Security techniques Information security risk management
    ISO/IEC 12207:2008 Systems and software engineering Software life cycle processes
    ISO/IEC 15408-1:2009 Information technology — Security techniques — Evaluation criteria for IT security — Part 1: Introduction and general model
    ISO/IEC 27000:2016 Information technology Security techniques Information security management systems Overview and vocabulary
    ISO Guide 73:2009 Risk management — Vocabulary
    • Access your standards online with a subscription

      Features

      • Simple online access to standards, technical information and regulations
      • Critical updates of standards and customisable alerts and notifications
      • Multi - user online standards collection: secure, flexibile and cost effective