Data

ISO-27001-Annex : A.14.3-Test-data

ISO 27001 Annex : A.14.3 Test data

ISO 27001 Annex : A.14.3  Test data its objective is to ensure that data used for research are secured. A.14.3.1  Protection of test data Control – Careful collection, security, and review of test data should be performed. Implementation Guidance – It should be avoided the use of operational information containing personal information or any other confidential information for test purposes. Where personal information or otherwise confidential information for testing purposes is used, all sensitive information …

ISO 27001 Annex : A.14.3 Test data Read More »

ISO-27001-Annex-A.13.2-Information-Transfer

ISO 27001 Annex : A.13.2 Information Transfer

ISO 27001 Annex : A.13.2  Information Transfer Its objective is to maintain the security of information transferred to any external entity and within the organization. A.13.2.1  Information Transfer Policies and Procedures Control- In order to protect the transferees by using all types of communication facilities, official transfer policies, procedures and controls should be developed. Implementation guidance – The following items should be addressed in the procedures and controls required to use communications facilities to transmit …

ISO 27001 Annex : A.13.2 Information Transfer Read More »

ISO-27001-Annex-A.12.7-Information-Systems-Audit-Considerations

ISO 27001 Annex : A.12.7 Information Systems Audit Considerations

ISO 27001 Annex : A.12.7 Information Systems Audit Considerations Its objective is minimizing the impact on operating systems of audit activities. A.12.7.1  Information Systems Audit Controls Control- The audit criteria and activities related to operating system verification should be carefully prepared and decided in order to reduce business process disturbance. Implementation Guidance – It is necessary to follow the following guidance: audit standards for access to systems and data should be negotiated with appropriate management; …

ISO 27001 Annex : A.12.7 Information Systems Audit Considerations Read More »

ISO-27001-Annex-A.12.3-Backup

ISO 27001 Annex : A.12.3 Backup

ISO 27001 Annex : A.12.3 Backup Its objective is to safeguard against data loss. A.12.3.1  Information backup Control- In accordance with the agreed backup policy copies of records, program and device images shall be collected and regularly tested Implementation Guidance – The organization’s information, software, and systems backup requirements should be established with a backup policy. The policy of backup should define the requirements for retention and protection. There should be sufficient backup facilities to …

ISO 27001 Annex : A.12.3 Backup Read More »

ISO-27001-Annex-12-Operations-Security

ISO 27001 Annex : 12 Operations Security

ISO 27001 Annex : 12 Operations Security in this article explain Operational procedures and responsibilities, Documented Operating Procedures, Change Management & Separation of Development, Testing and Operational Environments. A.12.1  Operational procedures and responsibilities Its objective is to ensure that information processing facilities operate correctly and securely. A.12.1.1  Documented Operating Procedures Control-Operating procedures should be documented and accessed by all users in need. Implementation Guidance- Documented procedures for operating information processing and communications facility activities should …

ISO 27001 Annex : 12 Operations Security Read More »

Learn how to do Error Recovery and Reliability

Learn how to do Error Recovery and Reliability in this TCP provides for reliable data transfer, which is additionally called reliability or error recovery, counting on what document you read. To accomplish reliability, TCP numbers data bytes using the Sequence and Acknowledgment fields within the TCP header. TCP achieves reliability in both directions, using the Sequence Number field of 1 direction combined with the Acknowledgment field within the opposite direction. Figure 5-7 shows an example …

Learn how to do Error Recovery and Reliability Read More »

Introduction-to-TCP-and-UDP

Introduction to TCP and UDP

Introduction to TCP and UDP in the OSI transport layer (Layer 4) defines several functions, the most important of which are error recovery and flow control. Likewise, the TCP/IP transport layer protocols also implement these same sorts of features. Note that both the OSI model and the TCP/IP model call this layer the transport layer. But as was common , when pertaining to the TCP/IP model, the layer name and number are supported OSI, so …

Introduction to TCP and UDP Read More »

Accessing-the-Internet

Accessing the Internet

Accessing the Internet Many people begin their CCENT and CCNA Routing and Switching study never having heard of leased lines, but many of us have heard of two other WAN technologies wont to gain access to the Internet: digital subscriber line (DSL) and cable. These two WAN technologies don’t replace leased lines altogether cases, but they are doing play an important role within the specific case of making a WAN connection between a home or …

Accessing the Internet Read More »