The scope of ISO/IEC 27000 is “to specify the fundamental principles, concepts and vocabulary for the ISO/IEC 27000 (information security management system) series of documents.” ISO/IEC 27000 contains the overview and vocabulary, in other words: An overview of the ISO27k standards showing how they are used collectively to plan, implement, certify and operate an ISMS, with a basic introduction to information security, risk management and management systems Carefully-worded definitions for the information security-related terms as they are used throughout the ISO27k standards. Information security, like most technical subjects, is evolving a complex web of terminology. Several core terms in information security (such as “risk”) have different meanings according to the context and the reader’s preconceptions. Few authors take the trouble to define precisely what they mean but this is unacceptable in the standards arena as it leads to confusion and deval... [More]
MVP Summit 2010 Seattle Overview, all Summit videos under one hoot: Justin & Erdal ( me) have interviewed many MVP’s from many different regions… • MVP Summit 2010 : Kyle Rosenthal & Erdal click here • MVP Summit 2010 – Erdal Ozkaya interviews Brad McCabe Click here • MVP Summit 2010 – Justin Rodino and Greek MVP [in Greek] click here • MVP Summit 2010 – Erdal and Hungarian MVP [in Hungarian] click here • MVP Summit 2010 – Jake Grey and fellow MVPs together with us : click here • MVP Summit 2010 – Korean and Chinese MVP’s – Take One click here • MVP Summit 2010 – Korean and China MVP’s – Take 2 Click here • MVP Summit 2010 – Interview with Rolly – Canada MVP Project Click here • MVP Summit 2010 – Justin and Miklos click here • MVP Summit 2010 – Interview with UK Windows Desktop Experience Bev Hatchard click here • MVP Summit 2010 – Justin Rodino and SharePoint MVP Click here • MVP Summit 2010 – Erdal and Dutch MVP click here • MVP Summit 2010 Being guest in a Kore... [More]
I am quite sure you read many articles based on these two products. There are some core fan’s of both of the gaming consoles. If you are about to buy a new gaming console and you are not sure on which one to buy, check the below photo’s which I took in a Local Australian Super store called “Harvey Norman” in their Canberra branch… Below pictures are taken from the gaming section Nothing seems wrong, now zoom in, in to my favourite console , which is XBOX 360 XBOX 360 and below is the Sony PS3 console in a display unit, Sony PS3 Sony PS3now STOP searching on the net, and buy the console, which is more reliable even in the SHOP
A good friend of mine Gary Duffuiled a MCLC, from the UK has shared a very interesting post, wanted to share with you as is: WHAT GOOGLE KNOWS ABOUT YOU ? Source: Computer World link click here Computerworld – “Google knows more about you than your mother.” Kevin Bankston, senior staff attorney at the Electronic Frontier Foundation, recently made that statement to this reporter. A few years ago, it might have sounded far-fetched. But if you’re one of the growing number of people who are using more and more products in Google’s ever-expanding stable (at last count, I was using a dozen), you might wonder if Bankston isn’t onto something. It’s easy to understand why privacy advocates and policymakers are sounding alarms about online privacy in general — and singling out Google in particular. If you use Googl... [More]
The essence of an IT security policy is to establish guidelines and standards for accessing the organisations information and application systems. As IT infrastructures have become more complex and organisations resources have become more distributed, the need for improved information security has increased.
An IT security policy facilitates the communication of security procedures to users and makes them more aware of potential security threats and associated business risks. A written IT security policy helps to enhance the performance of the organisations IT security systems and the e-business systems that they support.
Surveys regarding IT security all tend to show similar trends:
most organisations have been the victims of it security breaches,
IT security breaches cause significant damage,
IT security breaches are increasing,
insiders pose as significant a threat as outsiders.
If an organisation suffers an IT security breach it is likely to suffer negative impact. There a... [More]