<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3610215966995614992</id><updated>2024-09-10T00:08:12.491-07:00</updated><title type='text'>ISMS</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://surendhars52.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3610215966995614992/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://surendhars52.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>surendhar subramani</name><uri>http://www.blogger.com/profile/00358927539143501105</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>2</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3610215966995614992.post-3192023392521738251</id><published>2010-02-15T02:41:00.000-08:00</published><updated>2010-02-15T02:46:50.929-08:00</updated><title type='text'>A5 Security policy</title><content type='html'>Information security is the process of securing the information in the organization.&lt;br /&gt;&lt;h2&gt;A5.1.1 Information security policy document&lt;/h2&gt;&lt;br /&gt;&lt;p&gt;A n information security policy document shall be approved by management and published and commnicated to all employees and relevant external parties&lt;/p&gt;&lt;br /&gt;&lt;h2&gt;A5.1.2 Review of information security policy&lt;/h2&gt;&lt;br /&gt;&lt;p&gt;The information security policy shall be reviewed at planned intervals or if significant changes occur to ensure its continuing suitability,adequecy and effectiveness&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://surendhars52.blogspot.com/feeds/3192023392521738251/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3610215966995614992/3192023392521738251' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3610215966995614992/posts/default/3192023392521738251'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3610215966995614992/posts/default/3192023392521738251'/><link rel='alternate' type='text/html' href='http://surendhars52.blogspot.com/2010/02/a5-security-policy.html' title='A5 Security policy'/><author><name>surendhar subramani</name><uri>http://www.blogger.com/profile/00358927539143501105</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3610215966995614992.post-6297673513122780817</id><published>2010-02-09T21:12:00.000-08:00</published><updated>2010-02-09T22:26:32.355-08:00</updated><title type='text'>International standards</title><content type='html'>International standards&lt;br /&gt;This intermnational standards adopts a process approach for establishing ,implementing,operating ,monitoring,reviewing,maintaining and improving an organization ISMS.The appliaction of system of process within an organization ,together with the identification and interaction of the process and their management,can be reffered to as a process approach.The process approach for information security management presented in the international standard encourages its users to emphasize the importance of: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;a)Understanding an organization,s information security requirements and the need to establish policy and objectives of information security&lt;br /&gt;&lt;br /&gt;b)Implementing and operating controls to manage organization,s information security risks in the context of the organization&#39;s overall bussiness risks&lt;br /&gt;&lt;br /&gt;b)Monitoring and reviewind the performance and effectiveness of the ISMS&lt;br /&gt;&lt;br /&gt;d)Continual improvement based on objective measurement&lt;br /&gt;&lt;br /&gt;This international standard adopts the PDCA MODEL which is applies to structure all ISMS process&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The adoption of PDCA model will also reflects the prciples as set out in the OECD guidelines governing the secuirity of information systems and networks</content><link rel='replies' type='application/atom+xml' href='http://surendhars52.blogspot.com/feeds/6297673513122780817/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3610215966995614992/6297673513122780817' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3610215966995614992/posts/default/6297673513122780817'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3610215966995614992/posts/default/6297673513122780817'/><link rel='alternate' type='text/html' href='http://surendhars52.blogspot.com/2010/02/international-standards.html' title='International standards'/><author><name>surendhar subramani</name><uri>http://www.blogger.com/profile/00358927539143501105</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>