Back

ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity

ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity

ISO/IEC 27032:2012 Information Technology — Security Techniques — Guidelines for Cybersecurity

Status: Live
Published: 01/01/2012
Security level: Official
Amended / Internally developed: No
Live on platform: 23/06/21
Retired on platform:
Target Audience: Technical / General
Authoring body: International Organisation for Standardisation (ISO)
Grading: no grading applied
Standards
Abstract

ISO (the International Organisation for Standardisation) and IEC (the International Electrotechnical Commission) form the specialised system for worldwide standardisation. National bodies that are members of ISO or IEC participate in the development of International Standards through technical committees established by the respective organisation to deal with particular fields of technical activity. In the field of information technology, ISO and IEC have established a joint technical committee, ISO/IEC JTC 1.

The Cyberspace is a complex environment resulting from the interaction of people, software and services on the Internet, supported by worldwide distributed physical information and communications technology (ICT) devices and connected networks. However there are numerous security gaps not covered by current information security, Internet security, network security and ICT security. The aim of this international standard is to address Cyberspace security issues and bridge the gap between different security domains in the cyberspace.

International Standard provides technical guidance for addressing common cybersecurity risks such as social engineering, hacking, spyware and proliferation of malicious software.

It also provides guidelines for addressing risk such as preparing for attacks, detecting and monitoring attacks and responding to attacks.

The International Standard also provides a framework for information sharing, coordination, and incident handling.

Category: Security