[ispg-sm03] - ogcio
TRANSCRIPT
ISPG-SM03
A : ...................................................................................................29
management systems – Requirements (second edition), ISO/IEC 27001:2013
Information technology – Security techniques – Code of practice for
information security controls (second edition), ISO/IEC 27002:2013
Information technology – Security techniques – Governance of information
security, ISO/IEC 27014:2013
27040:2015
4
B
4.2.1
2 Bring your own device Security and risk consideration for your mobile device program
http://www.ey.com/Publication/vwLUAssets/EY_-
_Bring_your_own_device:_mobile_security_and_risk/$FILE/Bring_your_own_device.pdf
5.2.2
5.2.5
8 8
A : ...................................................................................................29
management systems – Requirements (second edition), ISO/IEC 27001:2013
Information technology – Security techniques – Code of practice for
information security controls (second edition), ISO/IEC 27002:2013
Information technology – Security techniques – Governance of information
security, ISO/IEC 27014:2013
27040:2015
4
B
4.2.1
2 Bring your own device Security and risk consideration for your mobile device program
http://www.ey.com/Publication/vwLUAssets/EY_-
_Bring_your_own_device:_mobile_security_and_risk/$FILE/Bring_your_own_device.pdf
5.2.2
5.2.5
8 8