-
Information Security Risk Management Guidelines下载
资源介绍
信息安全风险管理指导准则 AS HB231
Preface
The vulnerability of todays information society is still not sufficiently
realised: Businesses, administrations and society depend to a high degree
on the efficiency and security of modern information technology. In the
business community, for example, most of the monetary transactions are
administered by computers in the form of deposit money. Electronic
commerce depends on safe systems for money transactions in computer
networks. A companys entire production frequently depends on the
functioning of its data-processing system. Many businesses store their most
valuable company secrets electronically. Marine, air, and space control
systems, as well as medical supervision, rely to a great extent on modern
computer systems. Computers and the Internet also play an increasing role
in the education and leisure of minors. International computer networks are
the nerves of the economy, the public sector and society. The security of
these computer and communication systems is therefore of essential
importance.
European Commission 1998
Ever more powerful personal computers, converging technologies and the
widespread use of the Internet have replaced what were modest, stand-alone
systems in predominantly closed networks. Today, participants are
increasingly interconnected and the connections cross national borders. In
addition, the Internet supports critical infrastructures such as energy,
transportation and finance and plays a major part in how companies do
business, how governments provide services to citizens and enterprises and
how individual citizens communicate and exchange information. The nature
and type of technologies that constitute the communications and information
infrastructure also have changed significantly. The number and nature of
infrastructure access devices have multiplied to include fixed, wireless and
mobile devices and a growing percentage of access is through always on
connections. Consequently, the nature, volume and sensitivity of information
that is exchanged has expanded substantially.
As a result of increasing interconnectivity, information systems and
networks are now exposed to a growing number and a wider variety of
threats and vulnerabilities.
OECD 2002
Information security risk management forms the basis for an assessment of
an organizations information security framework. With increasing
electronic networking between organizations for a very wide range of
applications, which impacts on most aspects of life in our society, there is a
clear benefit in having a common set of reference documents for information
security management. This enables mutual trust to be established between
networked sites and trading partners and provides a basis for management of
facilities between information users and service providers. Security for
information systems is an essential requirement at organizational, national
and international levels.
This handbook was revised in 2003 to be consistent with
AS/NZS 7799.2:2003.
This Joint Australia/New Zealand Handbook has been prepared by
Committee IT-012, Information Systems, Security and Identification
Technology. This publication extends the generic work done by
Committee OB/7, Risk Management to specifically address the area of
information security management. Information security risk management
guidelines issued by the International Organization for
Standardization (ISO) as ISO/IEC TR 13335, Information technology
Guidelines for the management of IT security have been adapted to align
with the Australian and New Zealand Standard AS/NZS 4360, Risk
management.
AS/NZS ISO/IEC 17799 establishes a code of practice for selecting
information security controls (or equivalently treating information security
risks). AS/NZS 7799.2 (BS 7799.2) specifies an information security
management system. Both documents require that a risk assessment process
is used as the basis for selecting controls (treating risks). This Handbook
complements these Standards by providing additional guidance concerning
management of information security risks.
The guidance in this Handbook is not intended to be a comprehensive
schedule of information security threats and vulnerabilities. It is intended to
serve as a single reference point describing an information security risk
management process suitable for most situations encountered in industry and
commerce and therefore can be applied by a wide range of organizations.
Not all of the steps described in the handbook are relevant to every
situation, nor can they take account of local environmental or technological
constraints, or be presented in a form that suits every potential user in an
organization. Safety critical applications in particular will require additional
consideration of factors specific to the circumstances and relevant Standards
should be consulted in such cases. Consequently, these guidelines may
require to be augmented by further guidance before they can be used as a
basis (for example) for corporate policy or an inter-company trading
agreement.
It has been assumed in the drafting of these guidelines, that the execution of
their provisions is entrusted to appropriately qualified and experienced
people.