2 Standards, definitions and books

 

2.1 Standards

Standards and references related to information security

Jokes on information security

2.1

explicationsThe ISO 27000 family includes a large number of standards. Some of the most used standards are shown in figure 2-1:

iso 27000 family

Figure 2-1. ISO 27000 family

The standard on auditing is:

ISO 19011 (2018): Guidelines for auditing management systems

The standard ISO 31000: 2018 Risk Management - Guidelines establishes the principles and processactivities which transform inputs into outputs (see also ISO 9000, 3.4.1) for risk management, risk assessment and treatment.

The technical report ISO / TR 31004: 2013 Risk management - Guidelines for the implementation of ISO 31000 provides a better understanding of the principles and organizational framework of risk management.

The standard on business continuity is: ISO 22301 (2019) Security and resilience - Business continuity management systems - Requirements.

Regulation (EU) 2022/2554 of the European Parliament and of the Council of December 14, 2022 on digital operational resilience (DORA - Digital Operational Resilience Act) applicable to EU financial entities from January 17, 2025.

ISO standards (over 21,000) are used in countless fields and are recognized around the world.

Over 28,000 standards (in English and other languages) are available free of charge on the Public.resource.Org site.

Top of the page

 

2.2 Definitions

Terms and definitions related to information security

 2.2

The beginning of wisdom is the definitions of terms. Socrates

Some specific terms:

Asset: any element of value to the organization

Availability: property of information to be usable in time (see also ISO 27000, 3.7)

Backup: copy of data in order to archive and protect against loss

Competence: personal skills, knowledge and experiences (see also ISO 9000, 3.10.4)

Confidentiality: property of information accessible only to authorized persons (see also ISO 27000, 3.10)

Conformity: fulfillment of a specified requirement (see also ISO 9000, 3.6.11)

Corrective action: action to eliminate the causes of nonconformity or any other undesirable event and to prevent their recurrence (see also ISO 9000, 3.12.2)

Cryptography: activities of codification and decoding of information

Customer satisfaction: top priority objective of every quality management system related to the satisfaction of customer requirements (see also ISO 9000, 3.9.2)

Customer: anyone who receives a product (see also ISO 9000, 3.2.4)

Effectiveness: capacity to realize planned activities with minimum effort (see also ISO 9000, 3.7.11)

Efficiency: financial relationship between achieved results and resources used (see also ISO 9000, 3.7.10)

Incident (information security): unwanted and unexpected event that can compromise information security (see also ISO 27000, 3.31)

Indicator: value of a parameter, associated with a process objective, allowing the objective measure of its effectiveness (see also FD X50-171, 2.1)

Information security (IS): controls to protect the confidentiality, integrity and availability of information (see also ISO 27000, 3.28)

Information security management system: set of processes allowing the achievement of the information security objectives

Integrity: property of information to be unaltered (see also ISO 27000, 3.36)

Interested party: person, group or company affected by the impacts from an organization (see also ISO 9000, 3.2.3)

IS: information security

ISMS: information security management system

Management system: set of processes allowing objectives to be achieved (see also ISO 9000, 3.5.3)

Nonconformity: non-fulfillment of a specified requirement (see also ISO 9000, 3.6.9)

Objective: measurable goal to be achieved

Organization (company): structure that satisfies a need (see also ISO 9000, 3.2.1)

Process: activities that transform inputs into outputs (see also ISO 9000, 3.4.1)

Product (or service): any outcome of a process or activity (see also ISO 9000, 3.4.2)

Quality: aptitude to fulfill requirements (see also ISO 9000, 3.6.2)

Requirement: explicit or implicit need or expectation (see also ISO 9000, 3.6.4)

Residual risk: risk accepted (see also ISO Guide 73, 3.8.1.6)

Risk assessment: risk identification, analysis and evaluation process (see also ISO Guide 73, 3.4.1)

Risk treatment: risk reduction activities (see also ISO Guide 73, 3.8.1)

Risk: likelihood of occurrence of a threat or an opportunity (see also ISO Guide 73, 1.1)

Statement of applicability (SoA): document describing the objectives and security controls

Supplier (external provider): an entity that provides a product (see also ISO 9000, 3.2.5)

Top management: group or persons in charge of the organizational control at the highest level (see also ISO 9000, 3.1.1)

Traceability: aptitude to memorize or restore all or part of a trace of executed functions (see also ISO 9000, 3.6.13)

VLAN : Virtual Local Area Network

Vulnerability: weakness of an asset that could lead to unauthorized access (see also ISO 27000, 3.77)

In the terminology of management systems, do not confuse:

Information is stored in multiple ways such as:

Information is transmitted in different ways such as:

Remark 1: the use of ISO 27000 and ISO 9000 definitions is recommended. The most important thing is to determine a common and unequivocal vocabulary for everyone in the company.

Remark 2: the customer can also be the user, the beneficiary, the trigger, the ordering party or the consumer.

Remark 3: documented information is any information that we must maintain (procedure procedure) or retain (record record).

Remark 4: an asset is a broad concept. An asset can be:

For other definitions, comments, explanations and interpretations that you do not find in this module and annex 06 you can consult: explicationsrecord

 

Top of the page

 

2.3 Books

Books related to information security

2.3 

When I think of all the books still left for me to read, I am certain of further happiness. Jules Renard

explicationsBooks for further reading on quality and information security:

smileyMinute of relaxation. Game: Procedure

 

Top of the page