{"id":364819,"date":"2024-10-20T01:52:16","date_gmt":"2024-10-20T01:52:16","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bsi-pd-iso-iec-ts-271002020\/"},"modified":"2024-10-26T03:00:13","modified_gmt":"2024-10-26T03:00:13","slug":"bsi-pd-iso-iec-ts-271002020","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bsi-pd-iso-iec-ts-271002020\/","title":{"rendered":"BSI PD ISO\/IEC TS 27100:2020"},"content":{"rendered":"
This document provides an overview of cybersecurity.<\/p>\n
This document:<\/p>\n
describes cybersecurity and relevant concepts, including how it is related to and different from information security;<\/p>\n<\/li>\n
establishes the context of cybersecurity;<\/p>\n<\/li>\n
does not cover all terms and definitions applicable to cybersecurity; and<\/p>\n<\/li>\n
does not limit other standards in defining new cybersecurity-related terms for use.<\/p>\n<\/li>\n<\/ul>\n
This document is applicable to all types and sizes of organization (e.g. commercial enterprises, government agencies, not-for-profit organizations).<\/p>\n
PDF Pages<\/th>\n | PDF Title<\/th>\n<\/tr>\n | ||||||
---|---|---|---|---|---|---|---|
2<\/td>\n | National foreword <\/td>\n<\/tr>\n | ||||||
6<\/td>\n | Foreword <\/td>\n<\/tr>\n | ||||||
7<\/td>\n | Introduction <\/td>\n<\/tr>\n | ||||||
9<\/td>\n | 1 Scope 2 Normative references 3 Terms and definitions <\/td>\n<\/tr>\n | ||||||
10<\/td>\n | 4 Concepts 4.1 Cyberspace <\/td>\n<\/tr>\n | ||||||
11<\/td>\n | 4.2 Cybersecurity 5 Relationship between cybersecurity and relevant concepts 5.1 Relationship between information security and cybersecurity <\/td>\n<\/tr>\n | ||||||
12<\/td>\n | 5.2 Relationship between ISMS and cybersecurity 5.2.1 Cyberspace as a field of risk sources for an ISMS 5.2.2 ISMS in support of cybersecurity <\/td>\n<\/tr>\n | ||||||
13<\/td>\n | 5.3 Cybersecurity framework 5.4 Cybersecurity and safety 5.5 Cyber insurance <\/td>\n<\/tr>\n | ||||||
14<\/td>\n | 6 Risk management approach in the context of cybersecurity 6.1 General 6.2 Threat identification <\/td>\n<\/tr>\n | ||||||
15<\/td>\n | 6.3 Risk identification 7 Cyber threats 7.1 General 7.2 General business organization <\/td>\n<\/tr>\n | ||||||
16<\/td>\n | 7.3 Industrial organization and industrial automation and control systems 7.4 Products, services, and supplier relationships <\/td>\n<\/tr>\n | ||||||
17<\/td>\n | 7.5 Telecommunications services\/internet service providers 7.6 Public authorities <\/td>\n<\/tr>\n | ||||||
18<\/td>\n | 7.7 Critical infrastructure 7.8 Individual person 8 Incident management in cybersecurity 8.1 General <\/td>\n<\/tr>\n | ||||||
19<\/td>\n | 8.2 Incident management within an organization 8.3 Cross-organizational coordination 8.4 Technical support by product and service supplier <\/td>\n<\/tr>\n | ||||||
21<\/td>\n | Annex A (informative) A layered model representing cyberspace <\/td>\n<\/tr>\n | ||||||
25<\/td>\n | Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" Information technology. Cybersecurity. Overview and concepts<\/b><\/p>\n |