BS 7799-3:2005 Information security management systems. Guidelines for information security risk management
Identifying, evaluating, treating and managing information security risks are key processes if businesses want to keep their information safe and secure. Whilst these processes are specified in the new information security standard BS ISO/IEC 27001:2005, further guidance is required on how to manage these risks as well as to put them in context with other business risks.
Management decision making
Monitoring and reviewing of risk profile
Information security risk in the context of corporate governance
Compliance with other risk based standards and regulations
BS 7799-3:2005 gives guidance to support the requirements given in BS ISO/IEC 27001:2005 regarding all aspects of an information security management system (ISMS) risk management cycle. This includes assessing and evaluating the risks, implementing controls to treat the risks, monitoring and reviewing the risks, and maintaining and improving the system of risk controls. It is intended for those business managers and their staff involved in ISMS risk management activities.
|Format||Looseleaf||Published||17 Mar 2006|
|Availability||Out of Print: but may be available to order||Delivery||Delivery options and charges|