ÔÆÌ⺣ - רҵÎÄÕ·¶ÀýÎĵµ×ÊÁÏ·ÖÏíÆ½Ì¨

µ±Ç°Î»ÖãºÊ×Ò³ > ISMS·çÏÕÆÀ¹ÀÊÖ²á

ISMS·çÏÕÆÀ¹ÀÊÖ²á

  • 62 ´ÎÔĶÁ
  • 3 ´ÎÏÂÔØ
  • 2026/4/24 1:17:30

ÌṩµÄ¹¦ÄÜ¡£

1.4 ÐÅÏ¢°²È«ÓëÐÅÏ¢·çÏÕ£º

1.4.1 ÐÅÏ¢°²È«µÄ¶¨ÒåÓëÄ¿±ê

½öÒÔBS7799µÄ±ê×¼¶¨Òå×öΪ¼ò½é£¬¾ÍÊÇ¡¸ÐÅÏ¢¶Ô×éÖ¯¶øÑÔ¾ÍÊÇÒ»ÖÖ×ʲú£¬ºÍÆäËüÖØÒªµÄÓªÔË×ʲúÒ»ÑùÓмÛÖµ£¬Òò´ËÐèÒª³ÖÐø¸øÓèÍ×ÉÆ±£»¤¡£ÐÅÏ¢°²È«¿É±£»¤ÐÅÏ¢²»Êܸ÷ÖÖÍþв£¬È·±£³ÖÐøÓªÔË£¬½«ÓªÔËËðʧ½µµ½×îµÍ£¬µÃµ½×î·áºñµÄͶ×ʱ¨³êÂʺÍÉÌ»ú¡£¡¹

ÐÅÏ¢°²È«µÄÄ¿±êÔÚÓÚ±£»¤ÐÅÏ¢¼°ÆäÖ§³Ö´¦ÀíÉ豸¡¢ÏµÍ³ºÍÍøÂçµÄ»úÃÜÐÔ£¨Confidentiality£©¡¢ÍêÕûÐÔ£¨Integrity£¬»ò³ÆÕæÈ·ÐÔ£©ºÍ¿É»ñµÃÐÔ£¨Availability£¬»ò³Æ¿ÉÓÃÐÔ£©²»Êܵ½¸÷ÖÖ·½Ê½µÄÍþв£¬Ê¹¿ÉÄÜ·¢ÉúµÄÊÂÒµË𺦽µÖÁ×îµÍ£¬È·±£ÆóÒµµÄÓÀÐø¾­Óª£»ÀýÈ磬³ÌÐòÉè¼ÆÊ¦Ð´Íê³ÌÐò±ØÐëÏòÉϼ¶¹«¿ªÔ­Ê¼Âë¡¢ÆóÒµData Center±ØÐë½øÐÐÊý¾ÝÒìµØ±¸Ô®...µÈµÈ¶¼ÊÇ»ùÓÚ±£»¤ÐÅÏ¢°²È«µÄ¿¼ÂÇ¡£

1.4.2 ÐÅÏ¢°²È«¹ÜÀíµÄÒªËØ

ÓëÆäËü¹ÜÀíÒ»Ñù£¬°²È«¹ÜÀíÈýÒªËØÊÇPeople£¨ÈË£©¡¢Process£¨Á÷³Ì£©ÓëTechnology£¨¿Æ¼¼£©£¬ÒòΪÊÂÊÇÓÉÈË×ö³öÀ´µÄ£¬ÈËʰ²È«ÊÇËùÓа²È«µ±Öзdz£ÖØÒªµÄÒ»»·£¬ÆóÒµ»ò×éÖ¯ËùÄⶨ³öÀ´µÄ°²È«Õþ²ß»¹ÓÐÀµ¾ß±¸°²È«½ô¼±ÒâʶµÄ¡¸ÈË¡¹È¥×ñÑ­£»¶øÆóÒµÈôÄÜÕÆÎÕProcess˳³©£¬¼´¿ÉÕÆÎÕ80©‡ÒÔÉϵݲȫ£»Technology²¢·Çµ¥Ö¸CCTV¡¢ÃŽûϵͳµÈÉ豸£¬¶ø×î½üÏ൱ÈÈÃŵÄÐÅÏ¢°²È«Ò²¾ø·Çµ¥Ö¸·À»ðǽÓë·À¶¾Èí¼þ¶øÒÑ¡£

ÐÅÏ¢°²È«º­¸Ç·¶Î§Ï൱¹ã£¬²¢·Ç½öÖ¸ÒòÌØÍø£¬Ò²¾ø·ÇÖ»ÊÇ·À»ðǽ£¬ÒòΪÐÅÏ¢°²È«±ØÐëÒÔÈËÊ¡¢ÊµÌåÓë»·¾³°²È«Îª»ù´¡£¬ËùÓеĿƼ¼¶¼ÒÔЭÖú°²È«¹ÜÀíÕþ²ßΪĿµÄ£¬·ñÔò¿Æ¼¼Ö»ÊÇÒ»¸ö²úÆ·¡£ÀýÈ磬µ±¼ÆËã»úΪÁËÐÅÏ¢°²È«µÄÔµ¹Ê×°ÉÏ·À»ðǽ£¬È´¶ÔÆä°Ú·ÅλÖò»×öÊʵ±·À»¤£¬ÈçºÎ³ÆµÃÉϰ²È«£¿

1.4.3 ÐÅÏ¢·çÏյ͍ÒåÓëÒªËØ

ÐÅÏ¢·çÏÕϵָ¿ÉÄÜÓ°Ïì×ʲú¡¢Á÷³Ì¡¢×÷Òµ»·¾³»òÌØÊâÆóÒµ×éÖ¯Ö®Íþв£¬ÍþвÐÔÖʰüÀ¨²ÆÎñ¡¢·¨Áî¡¢²ßÂÔ¡¢¿Æ¼¼¡¢Êý¾ÝÔËÓü°¿ÉÄÜÓ°ÏìÆóÒµ»·¾³Ö®½á¹û¡£ÐÅÏ¢°²È«¹ÜÀíϵͳµÄ½¨ÖÃÈËÔ±Ó¦×ÅÖØÓÚÓëÐÅÏ¢°²È«¹ÜÀíÈýÒªËØÓйØÖ®·çÏյȼ¶£¬´ËµÈ·çÏյȼ¶Í¨³£ÈÝÒײúÉúÐÅÏ¢»úÃÜÐÔ¡¢ÍêÕûÐÔ»ò¿É»ñµÃÐÔÖ®Ëðʧ¡£

¶øÐÅÏ¢·çÏÕµÄÒªËØ¿É±íÏÖÓÚÏÂÁз½Ã棺

A. ÍⲿÍþв¡¢ÄÚ²¿Èõµã¡¢ÐèÒª±£»¤µÄ×÷Òµ»òÐÅÏ¢×ʲú¡£

B. ÒÀ¾Ý×ʲúÖ®Íþв¼°ÈõµãÖ®Ó°Ïì×ö³É³å»÷·ÖÎö(Impact Analysis)¡£

C. ÒÀ¹ÜÀíÄ¿±êÓëÏÖʵ״¿öËù×öÖ®²îÒì·ÖÎö(Gap Analysis)¼°ÆÀ¹À·çÏÕ¿ÉÄÜ·¢ÉúÖ®»úÂÊ¡£

1.5 ÐÅÏ¢·çÏÕµÄÖÖÀࣺ

Page:5 of 25 1.5.1 ÍêÕûÐÔ·çÏÕ£¨Integrity Risk£©£º

´Ë·çÏջᷢÉúÔÚÐÅÏ¢´¦ÀíµÄÁ½¸ö·¶³ë£¬·Ö±ðÊÇÐÅÏ¢»ù±¾¼Ü¹¹µÄ¹ÜÀí¡¢¼°Î¬³Ö×éÖ¯ÓªÔËËù±ØÐèµÄÓ¦ÓÃϵͳ¡£Æä·çÏÕÔÚÓÚÊý¾ÝµÄ´¦Àí¡¢ÓµÓС¢½Ò¶¾ùÎ¥·´ÁËÓªÔË¿ØÖƵÄʵÎñ£¬»òÐÅϢϵͳ֮Êä³ö¡¢ÈëÓë´¦ÀíµÄÕýÈ·Ô­Ôò¶Ë¿ØÖÆÁ÷³Ì£¬È磺Êý¾Ýת»»½Ó¿Ú³ö´í¡¢Êý¾ÝÄÚÈÝÔâÆÆ»µ£¬ÍøÒ³ÄÚÈÝÔâ¶ñÒâ´Ü¸Ä¡¢ÍøÂçÊý¾Ý½Ù¶á£¨Session Hijacking£©¼°Êý¾Ý½áËãÖ®´íÎó»ò¸ù±¾µÄ³ÌÐòÂß¼­Óë¾­ÓªÁ÷³Ì²»Ïà·û¡£

1.5.2 ÐÅÏ¢»ù´¡¼Ü¹¹·çÏÕ £¨Infrastructure Risk£©£º

´Ë·çÏÕϵÒò×é֯δÄܽ¨¹¹ÓÐЧÂʵÄÐÅÏ¢¿Æ¼¼»ù´¡¼Ü¹¹£¨ÈçÓ²¼þ¡¢ÍøÂç¡¢Èí¼þ¡¢ÈËÔ±¼°Á÷³Ì£©£¬»òδÄÜÔÚÓÐЧÂÊ¡¢¼°¿ØÖÆÁ¼ºÃµÄģʽÏ£¬Ö§³Ö×éÖ¯ÏÖÓм°Î´À´µÄÐèÇó¡£ÕâЩ·çÏÕÔÚÓڽ綨¡¢¿ª·¢¡¢Î¬»¤¼°¾­ÓªÐÅÏ¢´¦Àí»·¾³£¨Èç¼ÆËã»úÓ²¼þ¡¢Èí¼þϵͳ¡¢ÍøÂçµÈ£©µÄÒ»Á¬´®ÐÅÏ¢¿Æ¼¼´¦Àí³ÌÐò¼°Ïà¹ØµÄÓªÔËÓ¦ÓÃϵͳ£¨ÀýÈç¿Í»§·þÎñ¡¢Ó¦ÊÕ¸¶ÕʿÉú²úÅų̡¢ÐÅÓô¦ÀíµÈµÈ£©Óйأ¬¾Ù·²´Ó²Ù×÷ϵͳƽ̨£¬Êý¾Ý¿âϵͳ¡¢ÍøÂçϵͳ¡¢ÊµÌå»·¾³µÈµÈ£¬ÌرðÊÇÏÖ½ñe»¯»·¾³¶ÔÍøÂçµÄÒÀÀµÐԷdz£¸ß£¬Òò´ËÐÅÏ¢»ù´¡½¨ÉèÖ®Í걸£¬´«ÊäÖ®±£È«ÊÇÖØÒªµÄ·çÏÕ¿ØÖƵ㡣

1.5.3 ¿É»ñµÃÐÔ·çÏÕ£¨Availability Risk£©£º

µ±ÐèÒªÐÅÏ¢Ö´ÐÐÓªÔ˾ö²ß»ò¾­Óª»î¶¯Ê±£¬ÎÞ·¨¼°Ê±È¡µÃµÄ·çÏÕ£¬°üÀ¨£º

A. ÒòÐÅϢͨѶÖжÏËù²úÉúµÄËðʧ¡£ÀýÈ磺ЭÒé×è¶Ï·þÎñ¹¥»÷(Denial of Service)¡¢´«ÊäÏß·Öжϡ¢µç»°ÏµÍ³¶ÏÏß¡¢ÏµÍ³µ±»ú¡¢ÎÀÐǶÏѶ¡£

B. ´¦ÀíÐÅÏ¢µÄ»ù±¾ÄÜÁ¦Ö®É¥Ê§¡£ÀýÈ磺¼ÆËã»úϵͳЧÄܼ«µÍ£¬»ð¡¢Ë®ÔÖ¡¢¶Ïµç»òȱ·¦Êʵ±×¨ÒµÈËÔ±²Ù×÷ϵͳ¡£

C. ²Ù×÷ÉϵÄÀ§ÄÑ¡£ÀýÈ磺¿ØÖÆÈ¨ÔâÔ¶³Ì¿ØÖƳÌÐò½Ù¶á¡¢´ÅÅÌÇý¶¯Æ÷¹ÊÕÏ¡¢²Ù×÷ÈËԱʧÎóµÈ¡£

D. ÆóÒµ»ò×éÖ¯ÓªÔËÉϵÄÖжϡ£ÀýÈ磺ÌìÈ»ÔÖº¦¡¢¶ñÒâÆÆ»µ¡¢µ¡¹¤¡¢ÎÁÒß(½ñÄêËùÓöµ½µÄSARSÒßÇé±ãÊÇÒ»Àý)µÈ¡£

ÁíÍâÐÅÏ¢¿É»ñµÃÐÔ·çÏÕÓ¦×ÅÖØÒÔÏÂÈý¸ö²»Í¬µÄ²ãÃæ£º

A. ½åÓɼලЧÄܼ°ÔÚÎÊÌâ·¢Éúǰ²ÉȡԤ·À´ëÊ©£¬¿É±ÜÃâ´Ë·çÏÕ¡£ B. ¿ÉʹÓÃϵͳ»òÊý¾Ý»Ø¸´¼¼ÊõʹËðʧ½µÖÁ×îµÍ¡£

C. ÒòÌìÈ»ÔÖº¦¶øÔì³É³¤Ê±¼äÖ®ÖжÏËù²úÉúµÄ·çÏÕ£¬¿É͸¹ýÓ¦±ä¼Æ»®£¨Disaster Recovery Plan »ò Incident Handling Process£©¼°ÒµÎñ³ÖÐøÓªÔ˼ƻ®(Business Contingency Plan)ʹÐÅϢϵͳ¼õÉÙËðʧ¡£

1.5.4 »úÃÜÐÔ·çÏÕ¼°´æÈ¡·çÏÕ£¨Confidential Risk & Access Risk£©£º

´ËÀà·çÏÕ×ÅÖØÓÚ²»Êʵ±µÄ´æÈ¡ÐÅϢϵͳ¡¢Êý¾ÝºÍÐÅÏ¢Ö®·çÏÕ£¬Ëü°üÀ¨²»Êʵ±µÄȨÔð»®·Ö¡¢Êý¾ÝÓëÊý¾Ý¿âÕûºÏÖ®·çÏÕ¡¢ÒÔ¼°ÓëÐÅÏ¢»úÃÜÐÔÏà¹ØÖ®·çÏÕ£¬ÀýÈç²»Êʵ±µÄÈË¿ÉÄÜÈ¡µÃ»úÃÜÐÅÏ¢£¬¶øÊʵ±µÄÈËÈ´±»¾Ü¾ø´æÈ¡¡£

ÐÅÏ¢´æÈ¡µÄ·çÏÕÊÇÈ«ÃæÐԵģ¬Ò༴°üÀ¨ÒòÈκÎÄ¿µÄ¶øÈ¡µÃµÄÐÅÏ¢¡£ÁíÒ»ÀàÐÍÔòÈçʹÓÃÕßȨÏ޵IJ»Ïà·û£¬»òÊÇϵͳµ¼ÈëÖ®±ä¸ü£¬´«Í³Ö®²¿ÃżäÖ°ÄÜ·Ö¹¤×ª±äΪӦÓÃϵͳ½ÇÉ«¼°È¨ÏÞÖ®°çÑÝ£¬ÀýÈçÔ±¹¤¼æ¾ßÇ빺ÈËÔ±Óë²É

Page:6 of 25 ¹ºÈËԱ֮ȨÏÞ£¬¿ÉÄܵ¼Ö²»µ±ÊÚȨ½«µ¼ÖÂʹÓÃÕß´æÈ¡Î´¾­ÊÚȨ֮Êý¾ÝÖ®·çÏÕ£¬»òÔì³É»úÃÜÊý¾ÝÍâй¼°Î´¾­ÊÚȨ֮Ò춯¿ÉÄÜÐÔ¡£

1.5.5 Øü¹Ø·çÏÕ£¨Relevance Risk£©£º

Øü¹ØÐÔ·çÏÕϵָ¸ÃÐÅÏ¢ÓëËѼ¯¡¢Î¬»¤Óë´«´ïÐÅϢ֮ĿµÄÎ޹أ¬¸Ã·çÏÕϵÓëÐÅϢϵͳËù²úÉú»ò»ã×ÜÐÅÏ¢Ö®ÓÐÓÃÐÔÓëʱЧÐÔÓйء£ÒÀÐÔÖʶøÑÔ£¬ÐÅÏ¢µÄØü¹ØÐÔ·çÏÕÖ±½ÓÓ롸¾ö²ßÐÅÏ¢·çÏÕ¡¹Óйأ¬´Ë·çÏÕϵָÎÞ·¨½«¡¸ÕýÈ·¡¹Ö®Êý¾Ý»òÐÅÏ¢£¬´«´ï¸ø¡¸ÕýÈ·¡¹µÄ¾­Óª¡¢Ïû·Ñ»ò¹ÜÀí¾ö²ßÕߣ¬ÔÚ¡¸ÕýÈ·¡¹µÄʱ¼äÄÚ×ö³ö¡¸ÕýÈ·¡¹Ö®¾ö²ß¡£´Ë·çÏÕÖ®·¢ÉúÖ÷ҪϵÒòδ³ä·ÖÁ˽âÐÅÏ¢ÐèÇó¼°È±·¦¶ÔʱЧÐÔµÄ×¢Ò⣬½ø¶øË𺦵½½»Ò×Ë«·½µÄÈ¨Òæ¡¢ÆóÒµ¾ºÕùµÄÓÅÊÆ»òÊǹÜÀíµÄÐ§ÒæÓëЧÂÊ¡£

2 ÐÅÏ¢·çÏÕ¹ÜÀí¶ÔÐÅÏ¢°²È«¹ÜÀíϵͳµÄÖØÒªÐÔ

2.1 ÐÅÏ¢°²È«¹ÜÀíϵͳµÄ½¨ÖóÌÐò

2.1.1 ×ÈÒÔBS7799ΪÀý£º

ÐÅÏ¢°²È«¹ÜÀíϵͳºÍISO9001£º2000Äê°æÒ»ÖµزÉÓᱼƻ®-Ö´ÐÐ-¼ì²é-Ðж¯¡±(Plan-Do-Check-Act£¬PDCA)֮ģʽ£¬²¢Ó¦ÓÃÓÚËùÓÐÐÅÏ¢°²È«¹ÜÀíϵͳ֮½¨Öùý³Ì¡£Í¼1ϵչʾÐÅÏ¢°²È«¹ÜÀíϵͳÈçºÎ²ÉÄÉÐÅÏ¢°²È«ÒªÇóÖ®ÊäÈë¼°Àûº¦¹ØÏµÍÅÌåÖ®ÆÚÍû×÷ΪÊäÈë¶Ë£¬¾­Óɸ÷±ØÒª´ëÊ©¼°¹ý³Ì£¬²úÉú·ûºÏËùÐèÒªÇó¼°ÆÚÍûµÄÐÅÏ¢°²È«Êä³ö½á¹û¡£

ͼ1Ëùʾ֮PDCAģʽ£¬Í¬Ê±±íÏÖ×éÖ¯Ó¦ÔÚÕûÌåÒµÎñ»î¶¯Óë·çÏÕÏÂÖ´Ðпª·¢¡¢ÊµÊ©¡¢Î¬»¤¼°³ÖÐø¸Ä½øÐÅÏ¢°²È«¹ÜÀíϵͳ¡£PDCA¹ý³Ìģʽ²¢¿ÉÃèÊöÈçÏ£º P£º¼Æ»®£¨Plan£¬½¨Á¢ISMS£©£¬½¨Á¢°²È«Õþ²ß¡¢Ä¿±ê¡¢±êµÄ¡¢¹ý³Ì¼°Ïà¹Ø³ÌÐòÒÔ¹ÜÀí·çÏÕ¼°¸Ä½øÐÅÏ¢°²È«£¬Ê¹½á¹ûÓë×éÖ¯ÕûÌåÕþ²ßÓëÄ¿±êÏàÒ»Ö¡£ D£ºÖ´ÐУ¨Do£¬ÊµÊ©Óë²Ù×÷ISMS£©£¬°²È«Õþ²ß¡¢¿ØÖÆ´ëÊ©¡¢¹ý³ÌÓëÁ÷³Ì֮ʵʩÓë²Ù×÷¡£

C£º¼ì²é£¨Check£¬¼à¿ØÓëÉó²éISMS£©£¬ÒÀ¾Ý°²È«Õþ²ß¡¢Ä¿±êÓëʵ¼Ê¾­Ñ飬ÒÔÆÀ¼ø¼°²âÁ¿(Êʵ±Ê±)¹ý³Ì¼¨Ð§£¬²¢½«½á¹û»Ø±¨¸ø¹ÜÀí½×²ã¼ÓÒÔÉó²é¡£ A£ºÐж¯£¨Act£¬Î¬³ÖÓë¸Ä½øISMS£©£¬ÒÀ¾Ý¹ÜÀí½×²ãÉó²é½á¹û²ÉÈ¡½ÃÕýÓëÔ¤·À´ëÊ©£¬ÒÔ´ï³É³ÖÐø¸Ä½øÐÅÏ¢°²È«¹ÜÀíϵͳ¡£

Page:7 of 25 ͼ1£ºISO±ê×¼Ëù²ÉÓÃÖ®PDCAģʽ

³ýÁËͼ1ËùʾISO±ê׼ģʽ֮Í⣬×Ƚ«Æä¸ÅÄîת»»³ÉÁíÒ»ÖÖ½¨ÖóÌÐòµÄ³ÊÏÖ(Ïêͼ2)£¬ÒÔÌṩ¶ÁÕß×öΪ½¨ÖÃÖ®²Î¿¼¡£

¶ÔÕÕPDCAµÄ¹ý³ÌÃèÊö£¬´ó¼Ò¿ÉÒÔ¿´µ½ÐÅÏ¢°²È«¹ÜÀíϵͳÓëÖÆ¶ÈÖ®½¨ÖÃÊÇÒ»¸öÑ­»·²»¶ÏµÄ¹ý³Ì£¬ÆäÖеĻù´¡±ØÐëÏȽ¨Á¢Ä¿±êÓ밲ȫÕþ²ß¡£ÔÚÔË×÷¹ý³ÌÖÐÐèҪȡµÃÍêÕûµÄ¾ö²ßÐÅÏ¢(¿ÉÏë¶øÖª£¬ÈôÐÅÏ¢²»×ãʱÔòÆäÅжϽá¹û±ã»áÓÐÎó²î¡£ÔÙÀ´Õë¶Ô·çÏÕËù×öÖ®ÆóÒµ³ÖÐø²»¶ÏÖ®ÆÀ¹À¡¢¹ÜÀí¡¢¼à¶½ÐÞÕýµÈÐÐΪ½ÔÓëPDCAÓÐÖ±½Ó¹ØÁ¬¡£

½¨Á¢Ä¿±ê

IT Assets & Óë»ù´¡¼Ü¹¹ Security

Framework

Gap Analysis ÆÀ¹À·çÏÕ I.T. Audit Impact Analysis

³ÖÐøÐÔÐÞÕý ¹æ»®·çÏÕ ¾ö²ßÐÅÏ¢ ¹ÜÀí²ßÂÔ avoid / transfer/ reduce /accept ¼à¶½·çÏÕ¹ÜÀí Éè¼ÆÓëÖ´ÐÐ

³ÌÐò֮Ч¹û ·çÏտعܳÌÐò

I.T. Management IT Control & Security Policy

ͼ2£ºÐÅÏ¢°²È«¹ÜÀíϵͳ½¨ÖóÌÐò²Î¿¼Ê¾Òâͼ

2.1.2 ÐÅÏ¢°²È«¹ÜÀíϵͳ֮½¨Á¢²½Ö裺

A. ÒÀ¾ÝÒµÎñ¡¢×éÖ¯¡¢ËùÔÚλÖá¢×ʲú¼°¼¼ÊõµÈÌØÐÔ£¬¶¨ÒåÐÅÏ¢°²È«¹ÜÀíϵͳ֮·¶Î§¡£¼òµ¥µØËµ¾ÍÊÇÒª¾ö¶¨È«ÃæÊµÊ©»ò·Ö½×¶Î·Öµ¥Î»ÊµÊ©£¬´Ë¾Ù»áͬʱӰÏìÐÅÏ¢°²È«×ÊÔ´µÄ·ÖÅäÔËÓ㬶ԷçÏÕÆÀ¹ÀºóµÄ½ÓÊܶȣ¬ÒÔ¼°Ëù²ÉÓõķçÏÕ¹ÜÀí²ßÂÔ¡£ B. ÒÀ¾ÝÒµÎñ¡¢×éÖ¯¡¢ËùÔÚλÖá¢×ʲú¼°¼¼ÊõµÈÌØÐÔ£¬¶¨ÒåÐÅÏ¢°²È«¹ÜÀíϵͳ֮Õþ²ß£¬ÇÒÐ룺

Page:8 of 25

ËÑË÷¸ü¶à¹ØÓÚ£º ISMS·çÏÕÆÀ¹ÀÊÖ²á µÄÎĵµ
  • ÊÕ²Ø
  • Î¥¹æ¾Ù±¨
  • °æÈ¨ÈÏÁì
ÏÂÔØÎĵµ10.00 Ôª ¼ÓÈëVIPÃâ·ÑÏÂÔØ
ÍÆ¼öÏÂÔØ
±¾ÎÄ×÷Õߣº...

¹²·ÖÏí92ƪÏà¹ØÎĵµ

Îĵµ¼ò½é£º

ÌṩµÄ¹¦ÄÜ¡£ 1.4 ÐÅÏ¢°²È«ÓëÐÅÏ¢·çÏÕ£º 1.4.1 ÐÅÏ¢°²È«µÄ¶¨ÒåÓëÄ¿±ê ½öÒÔBS7799µÄ±ê×¼¶¨Òå×öΪ¼ò½é£¬¾ÍÊÇ¡¸ÐÅÏ¢¶Ô×éÖ¯¶øÑÔ¾ÍÊÇÒ»ÖÖ×ʲú£¬ºÍÆäËüÖØÒªµÄÓªÔË×ʲúÒ»ÑùÓмÛÖµ£¬Òò´ËÐèÒª³ÖÐø¸øÓèÍ×ÉÆ±£»¤¡£ÐÅÏ¢°²È«¿É±£»¤ÐÅÏ¢²»Êܸ÷ÖÖÍþв£¬È·±£³ÖÐøÓªÔË£¬½«ÓªÔËËðʧ½µµ½×îµÍ£¬µÃµ½×î·áºñµÄͶ×ʱ¨³êÂʺÍÉÌ»ú¡£¡¹ ÐÅÏ¢°²È«µÄÄ¿±êÔÚÓÚ±£»¤ÐÅÏ¢¼°ÆäÖ§³Ö´¦ÀíÉ豸¡¢ÏµÍ³ºÍÍøÂçµÄ»úÃÜÐÔ£¨Confidentiality£©¡¢ÍêÕûÐÔ£¨Integrity£¬»ò³ÆÕæÈ·ÐÔ£©ºÍ¿É»ñµÃÐÔ£¨Availability£¬»ò³Æ¿ÉÓÃÐÔ£©²»Êܵ½¸÷ÖÖ·½Ê½µÄÍþв£¬Ê¹¿ÉÄÜ·¢ÉúµÄÊÂÒµË𺦽µÖÁ×îµÍ£¬È·±£ÆóÒµµÄÓÀÐø¾­Óª£»ÀýÈ磬³ÌÐòÉè¼ÆÊ¦Ð´Íê³ÌÐò±ØÐëÏòÉϼ¶¹«¿ªÔ­Ê¼Âë¡¢ÆóÒµData Center±ØÐë½øÐÐÊý¾ÝÒìµØ±¸Ô®...µÈµÈ¶¼ÊÇ»ùÓÚ±£»¤ÐÅÏ¢°²È«µÄ¿¼ÂÇ¡£ 1.4.2 ÐÅ

¡Á ÓοͿì½ÝÏÂÔØÍ¨µÀ£¨ÏÂÔØºó¿ÉÒÔ×ÔÓɸ´ÖƺÍÅŰ棩
µ¥Æª¸¶·ÑÏÂÔØ
ÏÞÊ±ÌØ¼Û£º10 Ôª/·Ý Ô­¼Û:20Ôª
VIP°üÔÂÏÂÔØ
ÌØ¼Û£º29 Ôª/Ô ԭ¼Û:99Ôª
µÍÖÁ 0.3 Ôª/·Ý ÿÔÂÏÂÔØ150·Ý
ȫվÄÚÈÝÃâ·Ñ×ÔÓɸ´ÖÆ
VIP°üÔÂÏÂÔØ
ÌØ¼Û£º29 Ôª/Ô ԭ¼Û:99Ôª
µÍÖÁ 0.3 Ôª/·Ý ÿÔÂÏÂÔØ150·Ý
ȫվÄÚÈÝÃâ·Ñ×ÔÓɸ´ÖÆ
×¢£ºÏÂÔØÎĵµÓпÉÄÜ¡°Ö»ÓÐĿ¼»òÕßÄÚÈݲ»È«¡±µÈÇé¿ö£¬ÇëÏÂÔØÖ®Ç°×¢Òâ±æ±ð£¬Èç¹ûÄúÒѸ¶·ÑÇÒÎÞ·¨ÏÂÔØ»òÄÚÈÝÓÐÎÊÌ⣬ÇëÁªÏµÎÒÃÇЭÖúÄã´¦Àí¡£
΢ÐÅ£ºfanwen365 QQ£º370150219
Copyright © ÔÆÌ⺣ All Rights Reserved. ËÕICP±¸16052595ºÅ-3 ÍøÕ¾µØÍ¼ ¿Í·þQQ£º370150219 ÓÊÏ䣺370150219@qq.com