{"id":770,"date":"2018-03-13T15:41:04","date_gmt":"2018-03-13T12:41:04","guid":{"rendered":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/iso-27032-course\/"},"modified":"2018-03-14T09:09:36","modified_gmt":"2018-03-14T06:09:36","slug":"isoiec-27032-cyber-security","status":"publish","type":"page","link":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/services\/information-security-management\/isoiec-27032-cyber-security\/","title":{"rendered":"ISO\/IEC 27032 &#8211; Cyber Security"},"content":{"rendered":"<!--[fluid]--><!--{content}-->    <!--[section]-->\n\t\t<style>\n.bd-section-1572505374{background-color:#0aa6ce;}\n.bd-section-1572505374{\n\ttext-align:  center;\n}\n<\/style>\t\t<section id=section33 class=\" bd-section-1572505374 bd-page-width  bd-tagstyles\" data-section-title=\"Section\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t<!--[image]--><style>\n.additional-class-569870028{width:100%;}<\/style><img src=\"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-content\/uploads\/2017\/11\/iso-iec-27032.jpg\" alt=\"ISO\/IEC 27032, ISO 27032, Cyber Security, Information Security Management\" class=\" additional-class-569870028   bd-imagestyles bd-own-margins\"><!--{content}--><!--{\/content}--><!--[\/image]-->\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n<!--{\/content}--><!--[\/fluid]-->\n    <!--[section]-->\n\t\t\t\t<section id=section5 class=\" bd-section-337102613  bd-tagstyles\" data-section-title=\"\">\n\t\t\t<div class=\"bd-container-inner bd-margins clearfix\">\n\t\t\t\t<!--{content}-->\n\t\t\t\t\t    <!--[columns]-->\n        <style>\n.bd-layoutcontainer-469669121 > .bd-container-inner > .container-fluid > .row{height:100%;margin:0px;}\n.bd-layoutcontainer-469669121 > .bd-container-inner > .container-fluid > .row > div{padding:0px;}\n.bd-layoutcontainer-469669121  > .bd-container-inner > .container-fluid:after{display:none;}<\/style><style>\n.bd-layoutcontainer-469669121 > .bd-container-inner > .container-fluid, .bd-layoutcontainer-469669121 > .bd-container-inner > .container-fluid > .row{height:100%;}<\/style><style>.bd-layoutcontainer-469669121 > .bd-container-inner > .container-fluid {padding-left: 0; padding-right: 0;}<\/style>        <style>\n.bd-layoutcolumn-1102208557{background-color:#ffffff;min-height:250px;-webkit-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-o-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-ms-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);-moz-box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);box-shadow:0px 20px 100px 0 rgba(0, 0, 0, 0.33);margin:-4em 2em 2em;padding:2em;border-radius:20px;}\n@media (max-width: 767px) {.bd-layoutcolumn-1102208557{margin:-2em 1em 2em;}}<\/style>        <div class=\" bd-layoutcontainer-469669121  bd-columns bd-no-margins\">\n            <div class=\"bd-container-inner\">\n                <div class=\"container-fluid\">\n                    <div class=\"row bd-row-flex bd-row-align-middle\">\n                        <!--{content}-->\n                                <!--[column]-->\n        <div class=\"col-lg-12 bd-columnwrapper-1102208557\">\n            <div class=\"bd-column  bd-layoutcolumn-1102208557  bd-no-margins\">\n                <div class=\"bd-vertical-align-wrapper\">\n                    <!--{content}-->\n                        <!--[html]--><style>\n.additional-class-552789518{padding-right:1em;padding-left:1em;}<\/style><style><\/style><div class=\"bd-tagstyles  additional-class-552789518 \"><div class=\"bd-container-inner bd-content-element\"><!--{content}--><h1>ISO\/IEC 27032 - Cyber Security<\/h1>\r\n<h5 style=\"text-align:center\"><b>Information Security Management<\/b><\/h5>\r\n\r\n<p><b>ISO\/IEC 27032:2012<\/b> provides guidance for improving the state of <b>Cyber Security<\/b>, drawing out the unique aspects of that activity and its dependencies on other security domains, in particular:<\/p>\r\n\r\n<ul>\r\n    <li>information security,<\/li>\r\n    <li>network security,<\/li>\r\n    <li>internet security, and<\/li>\r\n    <li>critical information infrastructure protection (CIIP).<\/li>\r\n<\/ul>\r\n<p>ISO\/IEC 27032 (ISO 27032) covers the baseline security practices for stakeholders in the Cyberspace. This International Standard provides:<\/p>\r\n<ul>\r\n    <li>an overview of Cybersecurity,<\/li>\r\n    <li>an explanation of the relationship between Cybersecurity and other types of security,<\/li>\r\n    <li>a definition of stakeholders and a description of their roles in Cybersecurity,<\/li>\r\n    <li>guidance for addressing common Cybersecurity issues, and<\/li>\r\n    <li>a framework to enable stakeholders to collaborate on resolving Cybersecurity issues.<\/li>\r\n<\/ul>\r\n<\/p>\r\n<h3><b>Sections of ISO 27032<\/b><\/h3>\r\n<ul>\r\n<li>Section 0 : Overview<\/li>\r\n<li>Section 1 : Assets in the Cyberspace<\/li>\r\n<li>Section 2 : Threats against the security of the Cyberspace<\/li>\r\n<li>Section 3 : Roles of stakeholders in Cybersecurity<\/li>\r\n<li>Section 4 : Guidelines for stakeholders<\/li>\r\n<li>Section 5 : Cybersecurity controls<\/li>\r\n<li>Section 6 : Framework of information sharing and coordination<\/li>\r\n<li>Section 7 : Annex A. Cyber Security readiness<\/li>\r\n<li>Section 8 : Annex B. Additional resources<\/li>\r\n<li>Section 9 : Annex C. Examples of related documents<\/li>\r\n<\/ul><!--{\/content}--><\/div><\/div><!--[\/html]-->                    <!--{\/content}-->\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/column]-->\n                        <!--{\/content}-->\n                    <\/div>\n                <\/div>\n            <\/div>\n        <\/div>\n    <!--[\/columns]-->\n\t\t\t\t<!--{\/content}-->\n\t\t\t<\/div>\n\t\t<\/section>\n\t<!--[\/section]-->\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":2177,"parent":775,"menu_order":3,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/770"}],"collection":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/comments?post=770"}],"version-history":[{"count":0,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/770\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/pages\/775"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media\/2177"}],"wp:attachment":[{"href":"https:\/\/qaaftech.com\/demos\/cesiuminternational\/wp-json\/wp\/v2\/media?parent=770"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}