SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
ISO/IEC 27032 – Guidelines For
Cyber Security
Introduction
 ISO (the International Organization for Standardization) and IEC (the International
Electrotechnical Commission) form the specialized system for worldwide
standardization. ISO/IEC 27032 was prepared by Joint Technical Committee ISO/IEC JTC
1, Information technology, Subcommittee SC 27, IT Security techniques. The term
ISO/IEC 27032 refers to ‘Cybersecurity’ or ‘Cyberspace security,’ which is defined
as the protection of privacy, integrity, and accessibility of data information in the
Cyberspace. Therefore, Cyberspace is acknowledged as an interaction of persons,
software and worldwide technological services. The international standard ISO/IEC
27032 is intended to emphasize the role of different securities in the Cyberspace,
regarding information security, network and internet security, and critical information
infrastructure protection (CIIP). ISO/IEC 27032 as an international standard provides a
policy framework to address the establishment of trustworthiness, collaboration,
exchange of information, and technical guidance for system integration between
stakeholders in the cyberspace.
Scope And Focus
 The focus of this PowerPoint Presentation is to address internet security issues related
to ISO/IEC 27032 and provides technical guidance for addressing common internet
security risks.
 The standard does not directly address cyber safety, cybercrime, Internet safety,
Internet-related crime or protection of critical information infrastructure. This means
the Standard will only provide a guide that will help us to ensure that our interaction
with the virtual environment of cyberspace is much safer.
 In the attempt to improve the state of cyber security the following dependencies will
also satisfy by the ISO/IEC 27032 effortlessly.
information security
network security
internet security
critical information infrastructure protection
Benefits of ISO/IEC
 Protect the organization’s data and privacy from cyber threats
 Strengthen your skills in the establishment and maintenance of a Cyber security program
 Develop best practices to managing cyber security policies
 Improve the security system of organization and its business continuity
 Build confidence to stakeholders for your security measures.
 Respond and recover faster in the event of an incident.
Main differences between ISO 27001 and ISO
27032
 The main difference between ISO/IEC 27032 and ISO/IEC 27001 is in its respective
scope. ISO/IEC 27032 derives from and supports ISO/IEC 27001, which is related to
the Information Security, not regarding the nature of the asset to protect while
ISO/IEC 27032 considers only digital assets, naturally included into information
security assets. Moreover, ISO/IEC 27032 focuses on information system and
includes guidelines to prevent information leakage, to encrypt communication
channels and to make sure information will not be deciphered if accessed by
“external” people
Example
 Restocks Security is specialized in detecting malicious network behavior and Combatting
Crime. This follows Cyber Security Standard(ISO/IEC 27032) for its Malicious Threat
Detection(MTD) system.
Thank you

More Related Content

PDF
ISO 27001:2022 What has changed.pdf
PDF
PPTX
Cyber security
PPTX
19600 compliance management system guidelines
PPT
Poultry Management Lecture
PDF
ESG and Compliance: Where do we go from here?
PDF
ISMS_of ISO 27001-2022-awareness training
PPTX
ISO 9001:2015 Requirements.pptx
ISO 27001:2022 What has changed.pdf
Cyber security
19600 compliance management system guidelines
Poultry Management Lecture
ESG and Compliance: Where do we go from here?
ISMS_of ISO 27001-2022-awareness training
ISO 9001:2015 Requirements.pptx

What's hot (20)

PPTX
Iso iec 27032 foundation - cybersecurity training course
PPTX
27001.pptx
PPT
ISO 27001 - Information Security Management System
PDF
NQA ISO 27001 Implementation Guide
PPTX
Iso iec 27001 foundation training course by interprom
PDF
What is ISO 27001 ISMS
PDF
Presentacion SGSI
PPT
Information Security Management Systems(ISMS) By Dr Wafula
PPTX
ISO 27001 Awareness/TRansition.pptx
PDF
ISO 27001_2022 Standard_Presentation.pdf
PDF
Steps to iso 27001 implementation
PPTX
Implementing ISO27001 2013
PPT
isms-presentation.ppt
PPTX
Iso 27001 awareness
PDF
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
PPT
ISO 27001 Benefits
PDF
Why ISO27001 For My Organisation
PPTX
ISO_ 27001:2022 Controls & Clauses.pptx
Iso iec 27032 foundation - cybersecurity training course
27001.pptx
ISO 27001 - Information Security Management System
NQA ISO 27001 Implementation Guide
Iso iec 27001 foundation training course by interprom
What is ISO 27001 ISMS
Presentacion SGSI
Information Security Management Systems(ISMS) By Dr Wafula
ISO 27001 Awareness/TRansition.pptx
ISO 27001_2022 Standard_Presentation.pdf
Steps to iso 27001 implementation
Implementing ISO27001 2013
isms-presentation.ppt
Iso 27001 awareness
ISO 27001 How to use the ISMS Implementation Toolkit.pdf
ISO 27001 Benefits
Why ISO27001 For My Organisation
ISO_ 27001:2022 Controls & Clauses.pptx
Ad

Similar to ISO/IEC 27032 – Guidelines For Cyber Security (20)

PDF
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
PPTX
Network Security version1.0 - Module 3.pptx
PPTX
Network Security v1.0 - You have Module 3.pptx
PDF
Eric hibbard storage-security_the-standard
PPTX
Introduction to ICT, POLICIES, FRAMEWORK
PDF
ISO 27001 is the commonly used standard for ISMS implementation and certifica
PPTX
the role of 27001 in cybersecurity pp.pptx
PDF
ISO 27018 vs ISO 27001: What’s The Difference?
PPTX
Cybersecurity Management Solutions for Integrated OT-IT Systems.pptx
PPTX
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
PDF
ISO 27001 Information Security Management System Blog.pdf
PPTX
02 sasaran kendali pencapaian tujuan v05
PDF
Cisco cybersecurity essentials chapter 8
PDF
Enisa report guidelines for securing the internet of things
PDF
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
PDF
ISO 27001 Certification Course and Training: A Complete Guide to Information ...
PDF
ISO 27001 Certification Course and Training: A Complete Guide to Information ...
PDF
Cyber Security and Cloud Security
PPTX
Know more about exin unique information security program
PDF
20CS024 Ethics in Information Technology
PECB Webinar ISO27001 and how 27032 can help vFinal.pdf
Network Security version1.0 - Module 3.pptx
Network Security v1.0 - You have Module 3.pptx
Eric hibbard storage-security_the-standard
Introduction to ICT, POLICIES, FRAMEWORK
ISO 27001 is the commonly used standard for ISMS implementation and certifica
the role of 27001 in cybersecurity pp.pptx
ISO 27018 vs ISO 27001: What’s The Difference?
Cybersecurity Management Solutions for Integrated OT-IT Systems.pptx
Chapter 1 Best Practices, Standards, and a Plan of Action.pptx
ISO 27001 Information Security Management System Blog.pdf
02 sasaran kendali pencapaian tujuan v05
Cisco cybersecurity essentials chapter 8
Enisa report guidelines for securing the internet of things
Fortifying Information Assets Navigating the ISO 27001 Standard for Robust Cy...
ISO 27001 Certification Course and Training: A Complete Guide to Information ...
ISO 27001 Certification Course and Training: A Complete Guide to Information ...
Cyber Security and Cloud Security
Know more about exin unique information security program
20CS024 Ethics in Information Technology
Ad

Recently uploaded (20)

PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Introduction to Building Materials
PDF
IGGE1 Understanding the Self1234567891011
PDF
Computing-Curriculum for Schools in Ghana
PPTX
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
PDF
LDMMIA Reiki Yoga Finals Review Spring Summer
PPTX
Virtual and Augmented Reality in Current Scenario
PDF
advance database management system book.pdf
PDF
HVAC Specification 2024 according to central public works department
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
FORM 1 BIOLOGY MIND MAPS and their schemes
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
Indian roads congress 037 - 2012 Flexible pavement
PDF
Empowerment Technology for Senior High School Guide
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PDF
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
PDF
Hazard Identification & Risk Assessment .pdf
TNA_Presentation-1-Final(SAVE)) (1).pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Introduction to Building Materials
IGGE1 Understanding the Self1234567891011
Computing-Curriculum for Schools in Ghana
CHAPTER IV. MAN AND BIOSPHERE AND ITS TOTALITY.pptx
LDMMIA Reiki Yoga Finals Review Spring Summer
Virtual and Augmented Reality in Current Scenario
advance database management system book.pdf
HVAC Specification 2024 according to central public works department
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
FORM 1 BIOLOGY MIND MAPS and their schemes
History, Philosophy and sociology of education (1).pptx
Indian roads congress 037 - 2012 Flexible pavement
Empowerment Technology for Senior High School Guide
B.Sc. DS Unit 2 Software Engineering.pptx
medical_surgical_nursing_10th_edition_ignatavicius_TEST_BANK_pdf.pdf
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
MBA _Common_ 2nd year Syllabus _2021-22_.pdf
Hazard Identification & Risk Assessment .pdf

ISO/IEC 27032 – Guidelines For Cyber Security

  • 1. ISO/IEC 27032 – Guidelines For Cyber Security
  • 2. Introduction  ISO (the International Organization for Standardization) and IEC (the International Electrotechnical Commission) form the specialized system for worldwide standardization. ISO/IEC 27032 was prepared by Joint Technical Committee ISO/IEC JTC 1, Information technology, Subcommittee SC 27, IT Security techniques. The term ISO/IEC 27032 refers to ‘Cybersecurity’ or ‘Cyberspace security,’ which is defined as the protection of privacy, integrity, and accessibility of data information in the Cyberspace. Therefore, Cyberspace is acknowledged as an interaction of persons, software and worldwide technological services. The international standard ISO/IEC 27032 is intended to emphasize the role of different securities in the Cyberspace, regarding information security, network and internet security, and critical information infrastructure protection (CIIP). ISO/IEC 27032 as an international standard provides a policy framework to address the establishment of trustworthiness, collaboration, exchange of information, and technical guidance for system integration between stakeholders in the cyberspace.
  • 3. Scope And Focus  The focus of this PowerPoint Presentation is to address internet security issues related to ISO/IEC 27032 and provides technical guidance for addressing common internet security risks.  The standard does not directly address cyber safety, cybercrime, Internet safety, Internet-related crime or protection of critical information infrastructure. This means the Standard will only provide a guide that will help us to ensure that our interaction with the virtual environment of cyberspace is much safer.  In the attempt to improve the state of cyber security the following dependencies will also satisfy by the ISO/IEC 27032 effortlessly. information security network security internet security critical information infrastructure protection
  • 4. Benefits of ISO/IEC  Protect the organization’s data and privacy from cyber threats  Strengthen your skills in the establishment and maintenance of a Cyber security program  Develop best practices to managing cyber security policies  Improve the security system of organization and its business continuity  Build confidence to stakeholders for your security measures.  Respond and recover faster in the event of an incident.
  • 5. Main differences between ISO 27001 and ISO 27032  The main difference between ISO/IEC 27032 and ISO/IEC 27001 is in its respective scope. ISO/IEC 27032 derives from and supports ISO/IEC 27001, which is related to the Information Security, not regarding the nature of the asset to protect while ISO/IEC 27032 considers only digital assets, naturally included into information security assets. Moreover, ISO/IEC 27032 focuses on information system and includes guidelines to prevent information leakage, to encrypt communication channels and to make sure information will not be deciphered if accessed by “external” people
  • 6. Example  Restocks Security is specialized in detecting malicious network behavior and Combatting Crime. This follows Cyber Security Standard(ISO/IEC 27032) for its Malicious Threat Detection(MTD) system.