123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Bs7799 Common Practices

Profile Picture
By Author: Sam Wilcox
Total Articles: 4762
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The BS7799 Part I and the ISO 1779 basically provides only recommendations for ISMS and are available for use to all who are responsible for the initiation, implementation and management of information security in any organization. The BS7799 implementation provides for confidence and trust in inter and intra organizational communications, dealings and trading. These provide for code of practice which was formulated on the best practices of some of the top blue chip organizations of the world. The two standards provide for 36 security objectives and 127 security controls which are the building blocks of any ISMS in any organizations.
Some of the best practiced controls are;
• Policy document on Information Security
• Responsibility allocation for security of information
• Training and education on information security
• Reporting security breaches
• Disaster management and continuity of business.
Some factors are very critical in nature and should be taken care of while implementing the ISMS in an organization. ...
... These are;
• Integration of security policy and its objectives with the overall business objectives;
• Implementation of security culture which is relevant in the context of organizational culture;
• Managements support and commitment to implement IS;
• Risk understanding and management;
• Distribution of written guidelines for the employees in respect of security policy;
• Provision of training and education to employees;
• Measurement of performance in quantifiable terms of the ISMS.
Security requirements in all size of organizations is derived physical security of information; statutory and contractual requirement; and lastly form those objectives and requirements of information security which the organization has, over the period of time, developed to support its existing business operations. The contractual and statutory requirements may require the organizations to comply with the privacy laws of the country; the intellectual property laws in force; and specially safeguard of the knowledge bank of the organization.
About Author:
Sam Wilcox has more articles published such as What is MTTR and What is MTBF. Visit BS7799 Common Practices.

Total Views: 251Word Count: 353See All articles From Author

Add Comment

Business Articles

1. Fitatoo Smile Eco Raglan Hoodie Sustainable Streetwear In The Uk
Author: Fitatoo

2. Bridging Knowledge Gaps In Hse Through Interactive E-learning
Author: Jane

3. Role Of Quick Lime In The Pulp And Paper Industry: Uses And Benefits
Author: Shaurya Minerals

4. Top 5 Mistakes Homeowners Make When Hiring A Builder In Chennai And How To Avoid Them
Author: bharathi

5. Bpo Projects For Startup Company: Grow With Zoetic Bpo Services
Author: mohan

6. Scorpio Technologies – The Leading Responsive Web Design Company In Chennai
Author: scorpiotechnologies

7. Scorpio Technologies: The Best Web Design Service In Chennai
Author: scorpiotechnologies

8. Latest Indo Western Dress – Elegant Fusion Fashion
Author: le concept

9. Top Logo Designer In Ahmedabad: Crafting Unique Brand Identities That Speak Volumes
Author: Kymin Creation

10. What Types Of Noise Barriers Are Used To Lessen Noise Pollution?
Author: O'Neill Engineered Systems, Inc

11. Why Are Container Inspections Important For Safety?
Author: TIC

12. 10 Essential Tips For During Production Inspection
Author: TIC

13. What Is A Pre Production Inspection And Why Is It Important?
Author: TIC

14. How Does Quality Inspection Impact Product Quality?
Author: TIC

15. 8 Benefits Of Regular Quality Inspections
Author: TIC

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: