ECOWAS Essential Medicines & Vaccines
WA-MRH
Lang
English
French
Portuguese
ECOWAS Essential Medicines & Vaccines
WA-MRH
About Us
Overview - History & Mission
What We Do
Benefits
Success Stories
WA-MRH
Partners
Member Login
Communities of Practice
Member States
Benin
Burkina Faso
Cabo Verde
Cote d'Ivoire
The Gambia
Ghana
Guinea
Guinea-Bissau
Liberia
Mali
Niger
Nigeria
Senegal
Sierra Leone
Togo
ECOWAS
Regional Basket
Events & News
News media
Upcoming Events
Photo Gallery
Video Gallery
Document Center
Guidelines
SOPs
Manuals
Templates
Library
Publications
|
Lang
English
French
Portuguese
We use cookies, just to track visits to our website, we store no personal details.
Learn More
Accept
WAHO Guideline on Information Security Risk Management
Author:
WAHO
Category:
Information Management Systems
Language:
English
Date Updated:
8/10/2020 8:14:18 AM
Description
This document provides guidelines for information security risk management in an organization. However, this document does not provide any specific method for information security risk management. It is up to the organization to define their approach to risk management, depending for example on the scope of an information security management system (ISMS), context of risk management, or industry sector. A number of existing methodologies can be used under the framework described in this document to implement the requirements of an ISMS. This document is based on the asset, threat and vulnerability risk identification method that is no longer There are some other approaches that can be used
Abstract
This document provides guidelines for information security risk management. This document supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach. Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of this document. This document is applicable to all types of organizations (e.g. commercial enterprises, government agencies, non-profit organizations) which intend to manage risks that can compromise the organization’s information security.
Download PDF
Back To List
Feedback
×
Submit a feedback
Contact Email
Feedback Title
Feedback
Submit