• There are no items in your cart

JIS X 5080:2002

Withdrawn

Withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

View Superseded by
withdrawn

A Withdrawn Standard is one, which is removed from sale, and its unique number can no longer be used. The Standard can be withdrawn and not replaced, or it can be withdrawn and replaced by a Standard with a different number.

Information technology - Code of practice for information security management

Available format(s)

Hardcopy , PDF

Withdrawn date

20-04-2007

Language(s)

English, Japanese

Published date

01-09-2002

Foreword0 Introduction 0.1 General 0.2 Basic items and positioning of this Standard1 Scope2 Terms and definitions3 Security policy 3.1 Information security policy4 Organizational security 4.1 Information security infrastructure 4.2 Security of third party access 4.3 Outsourcing5 Asset classification and control 5.1 Accountability for assets 5.2 Information classification6 Personnel security 6.1 Security in job definition and resourcing 6.2 User training 6.3 Responding to security incidents and malfunctions7 Physical and environmental security 7.1 Secure areas 7.2 Equipment security 7.3 General controls8 Communications and operations management 8.1 Operating procedures and responsibilities 8.2 System planning and acceptance 8.3 Protection against malicious software 8.4 Housekeeping 8.5 Network management 8.6 Media handling and security 8.7 Exchanges of information and software9 Access control 9.1 Business requirement for access control 9.2 User access management 9.3 User responsibilities 9.4 Network access control 9.5 Operating system access control 9.6 Application access control 9.7 Monitoring system access and use 9.8 Mobile computing and teleworking10 Systems development and maintenance 10.1 Security requirements of systems 10.2 Security in application systems 10.3 Cryptographic controls 10.4 Security of system files 10.5 Security in development and support processes11 Business continuity management 11.1 Aspects of business continuity management12 Compliance 12.1 Compliance with legal requirements 12.2 Reviews of security policy and technical compliance 12.3 System audit controls

Provides recommendations for information security management for use by those who are responsible for initiating, implementing or maintaining security in their organization.

DocumentType
Standard
Pages
78
PublisherName
Japanese Standards Association
Status
Withdrawn
SupersededBy

2002 [20/02/2002]

View more information

Access your standards online with a subscription

Features

  • Simple online access to standards, technical information and regulations.

  • Critical updates of standards and customisable alerts and notifications.

  • Multi-user online standards collection: secure, flexible and cost effective.