{domain:"www.qualitydigest.com",server:"169.47.211.87"} Skip to main content

User account menu
Main navigation
  • Topics
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Videos/Webinars
    • All videos
    • Product Demos
    • Webinars
  • Advertise
    • Advertise
    • Submit B2B Press Release
    • Write for us
  • Metrology Hub
  • Training
  • Subscribe
  • Log in
Mobile Menu
  • Home
  • Topics
    • 3D Metrology-CMSC
    • Customer Care
    • FDA Compliance
    • Healthcare
    • Innovation
    • Lean
    • Management
    • Metrology
    • Operations
    • Risk Management
    • Six Sigma
    • Standards
    • Statistics
    • Supply Chain
    • Sustainability
    • Training
  • Login / Subscribe
  • More...
    • All Features
    • All News
    • All Videos
    • Contact
    • Training

Improved ISO/IEC 17799 Standard Makes Information More Secure

Quality Digest
Tue, 07/12/2005 - 22:00
  • Comment
  • RSS

Social Sharing block

  • Print
Body
An improved version of ISO/IEC 17799, which has become the e-commerce community’s international benchmark for information security management, was recently published. The new version broadens the standard’s definition of information security, providing best business practices, guidelines and general principles for implementing, maintaining and managing information in any organization, and producing and using information in any form. The new version also identifies the controls that form the starting point for information security, addressing asset management, human resources, physical and environmental security, communications and operations management, information systems acquisitions, development and maintenance, incident management, business continuity and compliance. It’s designed for all size organizations, public or private.

The revised standard recognizes that the level of security that can be achieved purely through technical means is limited. The required level of security—established through assessing the levels of risk and associated costs through breaches of security, against the costs of implementing security—should always be driven by appropriate management controls and procedures.

 …

Want to continue?
Log in or create a FREE account.
Enter your username or email address
Enter the password that accompanies your username.
By logging in you agree to receive communication from Quality Digest. Privacy Policy.
Create a FREE account
Forgot My Password

Add new comment

Image CAPTCHA
Enter the characters shown in the image.
Please login to comment.
      

© 2025 Quality Digest. Copyright on content held by Quality Digest or by individual authors. Contact Quality Digest for reprint information.
“Quality Digest" is a trademark owned by Quality Circle Institute Inc.

footer
  • Home
  • Print QD: 1995-2008
  • Print QD: 2008-2009
  • Videos
  • Privacy Policy
  • Write for us
footer second menu
  • Subscribe to Quality Digest
  • About Us
  • Contact Us