ISO/IEC TS 27100:2020
(Main)Information technology — Cybersecurity — Overview and concepts
Information technology — Cybersecurity — Overview and concepts
This document provides an overview of cybersecurity. This document: — describes cybersecurity and relevant concepts, including how it is related to and different from information security; — establishes the context of cybersecurity; — does not cover all terms and definitions applicable to cybersecurity; and — does not limit other standards in defining new cybersecurity-related terms for use. This document is applicable to all types and sizes of organization (e.g. commercial enterprises, government agencies, not-for-profit organizations).
Titre manque
General Information
Relations
Buy Standard
Standards Content (Sample)
TECHNICAL ISO/IEC TS
SPECIFICATION 27100
First edition
2020-12
Information technology —
Cybersecurity — Overview and
concepts
Reference number
ISO/IEC TS 27100:2020(E)
©
ISO/IEC 2020
---------------------- Page: 1 ----------------------
ISO/IEC TS 27100:2020(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC TS 27100:2020(E)
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Concepts . 2
4.1 Cyberspace. 2
4.2 Cybersecurity . 3
5 Relationship between cybersecurity and relevant concepts . 3
5.1 Relationship between information security and cybersecurity . 3
5.2 Relationship between ISMS and cybersecurity . 4
5.2.1 Cyberspace as a field of risk sources for an ISMS . 4
5.2.2 ISMS in support of cybersecurity . 4
5.3 Cybersecurity framework . 5
5.4 Cybersecurity and safety . 5
5.5 Cyber insurance . . 5
6 Risk management approach in the context of cybersecurity . 6
6.1 General . 6
6.2 Threat identification . 6
6.3 Risk identification . 7
7 Cyber threats .
...
TECHNICAL ISO/IEC TS
SPECIFICATION 27100
First edition
2020-12
Information technology —
Cybersecurity — Overview and
concepts
Reference number
ISO/IEC TS 27100:2020(E)
©
ISO/IEC 2020
---------------------- Page: 1 ----------------------
ISO/IEC TS 27100:2020(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO/IEC 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO/IEC 2020 – All rights reserved
---------------------- Page: 2 ----------------------
ISO/IEC TS 27100:2020(E)
Contents Page
Foreword .iv
Introduction .v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Concepts . 2
4.1 Cyberspace. 2
4.2 Cybersecurity . 3
5 Relationship between cybersecurity and relevant concepts . 3
5.1 Relationship between information security and cybersecurity . 3
5.2 Relationship between ISMS and cybersecurity . 4
5.2.1 Cyberspace as a field of risk sources for an ISMS . 4
5.2.2 ISMS in support of cybersecurity . 4
5.3 Cybersecurity framework . 5
5.4 Cybersecurity and safety . 5
5.5 Cyber insurance . . 5
6 Risk management approach in the context of cybersecurity . 6
6.1 General . 6
6.2 Threat identification . 6
6.3 Risk identification . 7
7 Cyber threats .
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.