123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Business >> View Article

Bs7799 Common Practices

Profile Picture
By Author: Sam Wilcox
Total Articles: 4762
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

The BS7799 Part I and the ISO 1779 basically provides only recommendations for ISMS and are available for use to all who are responsible for the initiation, implementation and management of information security in any organization. The BS7799 implementation provides for confidence and trust in inter and intra organizational communications, dealings and trading. These provide for code of practice which was formulated on the best practices of some of the top blue chip organizations of the world. The two standards provide for 36 security objectives and 127 security controls which are the building blocks of any ISMS in any organizations.
Some of the best practiced controls are;
• Policy document on Information Security
• Responsibility allocation for security of information
• Training and education on information security
• Reporting security breaches
• Disaster management and continuity of business.
Some factors are very critical in nature and should be taken care of while implementing the ISMS in an organization. ...
... These are;
• Integration of security policy and its objectives with the overall business objectives;
• Implementation of security culture which is relevant in the context of organizational culture;
• Managements support and commitment to implement IS;
• Risk understanding and management;
• Distribution of written guidelines for the employees in respect of security policy;
• Provision of training and education to employees;
• Measurement of performance in quantifiable terms of the ISMS.
Security requirements in all size of organizations is derived physical security of information; statutory and contractual requirement; and lastly form those objectives and requirements of information security which the organization has, over the period of time, developed to support its existing business operations. The contractual and statutory requirements may require the organizations to comply with the privacy laws of the country; the intellectual property laws in force; and specially safeguard of the knowledge bank of the organization.
About Author:
Sam Wilcox has more articles published such as What is MTTR and What is MTBF. Visit BS7799 Common Practices.

Total Views: 196Word Count: 353See All articles From Author

Add Comment

Business Articles

1. Preserving The Past: Effective Exterior Cleaning For Historic Buildings
Author: Proclean

2. Online Lead Generation Strategies For 2025
Author: Machintel

3. Dispenser Types For Effective Sanitization
Author: abbasjuzer24

4. A Comprehensive Guide To Automated Testing Solutions
Author: Arnav Goyal

5. Achieve Leed Certification In Dubai And The Uae With Agile Advisors: Your Trusted Sustainability Partner
Author: kohan

6. Information And Data Security In Kerala: The Digital Landscape
Author: mitesh

7. Why Visiting Display Homes Can Inspire Your Dream Home?
Author: longislandhomes

8. China Intracranial Pressure Monitoring Devices Market Size, Share, Growth, Trends And Forecasts
Author: Andy

9. Gas Suppression System Manufacturer In Ahmedabad: A Comprehensive Overview
Author: Manish Patel

10. Pathology Labs In Balasore: Revolutionizing Diagnostics At Medicare
Author: medicare

11. Get It Gone: Brighton’s Trusted Partner For Rubbish And Waste Clearance
Author: get it gone

12. Hexamethyldisilazane Manufacturers (hmds)
Author: connex

13. How Financial Institutions Are Leveraging Tech For Operational Efficiency
Author: Nationallinkatm

14. Web Application Development Service In Longmont, Co – Colorado Web Services
Author: coloradoweb

15. Ferrule Fittings For Chemical Plants: How To Prevent Corrosion And Wear
Author: Online fittings

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: