Information security management system

Information security management system

Système de gestion de la sécurité de l'information

Un système de gestion de la sécurité de l'information (en anglais : Information security management system, ou ISMS) est, comme son nom le suggère, un système de gestion concernant la sécurité de l'information.
L'expression Système de Management de la Sécurité de l'Information (SMSI) est également utilisée en français.

Le plus connu des SMSI est ISO/CEI 27001, publié par l'ISO en complément de ISO/CEI 27002 (anciennement référencé ISO/CEI 17799).

D'autres SMSI sont :

Voir aussi

Liens externes

  • Portail de la sécurité de l’information Portail de la sécurité de l’information
  • Portail de la sécurité informatique Portail de la sécurité informatique
Ce document provient de « Syst%C3%A8me de gestion de la s%C3%A9curit%C3%A9 de l%27information ».

Wikimedia Foundation. 2010.

Contenu soumis à la licence CC-BY-SA. Source : Article Information security management system de Wikipédia en français (auteurs)

Игры ⚽ Нужна курсовая?

Regardez d'autres dictionnaires:

  • Information security management system — An Information Security Management System (ISMS) is, as the name suggests, a set of policies concerned with information security management. The idiom arises primarily out of ISO/IEC 27001.The key concept of ISMS is for an organization to design …   Wikipedia

  • Information Security Management System — Das Information Security Management System (ISMS, engl. für „Managementsystem für Informationssicherheit“) ist eine Aufstellung von Verfahren und Regeln innerhalb eines Unternehmens, welche dazu dienen, die Informationssicherheit dauerhaft zu… …   Deutsch Wikipedia

  • Information Security Management — Information security (ISec) describes activities that relate to the protection of information and information infrastructure assets against the risks of loss, misuse, disclosure or damage. Information security management (ISM) are controls that… …   Wikipedia

  • Information security — Components: or qualities, i.e., Confidentiality, Integrity and Availability (CIA). Information Systems are decomposed in three main portions, hardware, software and communications with the purpose to identify and apply information security… …   Wikipedia

  • Federal Information Security Management Act of 2002 — The Federal Information Security Management Act of 2002 ( FISMA , usc|44|3541, et seq. ) is a United States federal law enacted in 2002 as Title III of the E Government Act of 2002 (USPL|107|347, USStat|116|2899). The act was meant to bolster… …   Wikipedia

  • Information security professionalism — is the set of knowledge that people working in Information security and similar fields (Information Assurance and Computer security) should have and eventually demonstrate through certifications from well respected organizations. It also… …   Wikipedia

  • Management system — A management system is the framework of processes and procedures used to ensure that an organization can fulfill all tasks required to achieve its objectives[1]. For instance, an environmental management system enables organizations to improve… …   Wikipedia

  • ITIL Security Management — The ITIL Security Management process describes the structured fitting of security in the management organization. ITIL Security Management is based on the Code of practice for information security management also known as ISO/IEC 17799.A basic… …   Wikipedia

  • Information Systems Security Management Professional — is a designation awarded by the International Information Systems Certification Consortium ((ISC)^2).For experienced information security professionals with an International Information Systems Security Certification Consortium ((ISC)2)… …   Wikipedia

  • Security management — is a broad field of management related to asset management, physical security and human resource safety functions. It entails the identification of an organization s information assets and the development, documentation and implementation of… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”