Security Policy: Difference between revisions

Jump to navigation Jump to search
Line 91: Line 91:
* how to:  
* how to:  
:(a) integrate and implement the actions into its information security management system processes; and  
:(a) integrate and implement the actions into its information security management system processes; and  
          (b) evaluate the effectiveness of these actions.
:(b) evaluate the effectiveness of these actions.


====Information security risk assessment====
====Information security risk assessment====