top of page


Offentlig·10 medlemmer

Iso 27005 Pdf BETTER

ISO/IEC 27005:2011 is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that could compromise the organization's information security.

Iso 27005 Pdf BETTER

In the interconnected, globalized, digitally-dependent world, cyberattacks have risen to a prime concern. Furthermore, legislation like the General Data Protection Regulation (GDPR) has pressured organizations to keep their information secure. Overall, risk is abundant, and the need to acknowledge and address the persistent potential of data breaches makes ISO/IEC 27005:2022 so significant.

ISO/IEC 27005:2022 also includes clear information that the standard does not contain direct guidance on the implementation of the information security management system (ISMS) requirements specified in ISO/IEC 27001:2022.

Risk is present in all aspects of life. Managing it in the relied-upon context of information security is a necessity. ISO/IEC 27005:2022 is based on the asset, threat, and vulnerability risk identification method that was once a part of ISO/IEC 27001.

The majority of the requirements, controls, risk assessments, and management frameworks were derived by researchers and refer to international and national regulations and standards. Several standards and regulations were found in the literature. Some of them were outdated [21] and have been replaced with new versions, such as the British Security Standard BS7799 [22], which was replaced by ISO/IEC risk assessment family standards, such as ISO/IEC27005. Table 8 presents the identified general standards and regulations relating to HIoT, BC, and IdM security risks that are in use. Those that could not be derived from the SLR were derived via GL.

To tackle these issues, we propose a comprehensive security risk management for HIoT BC-Based IdM systems, as shown in Figure 6. The proposed security framework for the HIoT BC-IdM system is influenced by three main sources: First, general risk assessment frameworks, such as ISO 31000, ISO 27005, and NIST 800-30; second, risk management and assessment frameworks that are proposed by some of the reviewed studies for HIoT, IdM, and BC, as shown in Table 10; and third, standard and regulation recommendations, such as GDPR, PIA, and security control assessments [17]. For example, EU GDPR requires a data protection impact assessment (DPIA) to mitigate risks to data-subject privacy. The application of DPIA in HIoT BC IdM systems is vital, as previous studies show that there are security threats to identity privacy.

bottom of page