Sensitive Information
information, the loss, misuse or modification of which, or unauthorized access to, could:(a) adversely affect the privacy, welfare or safety of an individual or individuals;(b)… Read More »Sensitive Information
information, the loss, misuse or modification of which, or unauthorized access to, could:(a) adversely affect the privacy, welfare or safety of an individual or individuals;(b)… Read More »Sensitive Information
A document (or part of a document) identified in the Information Particulars setting out the security requirements for carrying out the Works in a security-minded… Read More »Security Management Plan
The System of Engagement is defined as a platform that manages supported digital engagement, of systems like Browsing, Web Chat, Messaging, videos (Facebook, WhatsApp, TEAMS,… Read More »System of engagement
A system of systems is a collection of many different systems, each with its own characteristics. [1] System theory assumes that certain underlying concepts and… Read More »System of systems
Information security management systemsPart 3: Guidelines for information security risk management (revision of BS ISO/IEC 27005:2011)
Information technology – Security techniques – Information security management systems – Overview and vocabulary ISO 27000 is derived from the British Standard 7799, published in… Read More »BS EN ISO IEC 27000:2020
weakness that can be exploited to cause harm [cited from ISO 19650-5:2020(en), 3.15]
state of relative freedom from threat (3.13) or harm caused by deliberate, unwanted, hostile or malicious acts [cited from ISO 19650-5:2020(en), 3.7]
amount and type of risk that an organization is willing to pursue or retain [cited from ISO 19650-5:2020(en), 3.5]
The purpose of using Common Data Environment (CDE) on a project is to provide the right person with the right information at the right time.[1]… Read More »Common data environment (CDE)