Attributes | Values |
---|
rdf:type
| |
Description
| - For a more efficient way of management and for the need to prove itself in the more and more demanding market environment, every organization, enterprise or company has to achieve higher competitiveness. This can be achieved by the implementation of modern systems of management. One of those new systems is the Information Security Management System. Then it is necessary to have trained auditors to perform audits. There are various types of audits such as e.g. the audit by the first party (the internal audit), the audit by the second party (the audit of supplier) or the audit by the third part (certification body). Audits are performed in order to assess how well the Information Security Management System will correspond with the standard according to which it is implemented and certificated as a result. Problems of information security management system require comprehensive knowledge. We can see list of standards, which auditor has to know.
- For a more efficient way of management and for the need to prove itself in the more and more demanding market environment, every organization, enterprise or company has to achieve higher competitiveness. This can be achieved by the implementation of modern systems of management. One of those new systems is the Information Security Management System. Then it is necessary to have trained auditors to perform audits. There are various types of audits such as e.g. the audit by the first party (the internal audit), the audit by the second party (the audit of supplier) or the audit by the third part (certification body). Audits are performed in order to assess how well the Information Security Management System will correspond with the standard according to which it is implemented and certificated as a result. Problems of information security management system require comprehensive knowledge. We can see list of standards, which auditor has to know. (en)
|
Title
| - Audit of Information Security Management System
- Audit of Information Security Management System (en)
|
skos:prefLabel
| - Audit of Information Security Management System
- Audit of Information Security Management System (en)
|
skos:notation
| - RIV/61989592:15210/12:33141647!RIV13-MSM-15210___
|
http://linked.open...avai/riv/aktivita
| |
http://linked.open...avai/riv/aktivity
| |
http://linked.open...vai/riv/dodaniDat
| |
http://linked.open...aciTvurceVysledku
| |
http://linked.open.../riv/druhVysledku
| |
http://linked.open...iv/duvernostUdaju
| |
http://linked.open...titaPredkladatele
| |
http://linked.open...dnocenehoVysledku
| |
http://linked.open...ai/riv/idVysledku
| - RIV/61989592:15210/12:33141647
|
http://linked.open...riv/jazykVysledku
| |
http://linked.open.../riv/klicovaSlova
| - Information security management system, standard, information security, security management (en)
|
http://linked.open.../riv/klicoveSlovo
| |
http://linked.open...ontrolniKodProRIV
| |
http://linked.open...in/vavai/riv/obor
| |
http://linked.open...ichTvurcuVysledku
| |
http://linked.open...cetTvurcuVysledku
| |
http://linked.open...UplatneniVysledku
| |
http://linked.open...iv/tvurceVysledku
| |
http://localhost/t...ganizacniJednotka
| |