Information technology — Security techniques — Information security risk management
1 Scope
This International Standard provides guidelines for information security risk management.
This International Standard supports the general concepts specified in ISO/IEC 27001 and is designed to
assist the satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001…
Petroleum and natural gas industries — Specific requirements for offshore structures — Part 3: Topsi...
1 Scope
This part of ISO 19901 gives requirements for the design, fabrication, installation, modification and structural
integrity management for the topsides structure for an oil and gas platform. It complements ISO 19902,
ISO 19903, ISO 19904-1, ISO 19905-1 and ISO 19906, which give requirements for various forms of support
structure. Requirements in this part of ISO 19901 concerning…
Petroleum and natural gas industries — Specific requirements for offshore structures — Part 3: Topsi...
This part of ISO 19901 gives requirements for the design, fabrication, installation, modification and structural integrity management for the topsides structure for an oil and gas platform. It complements ISO 19902, ISO 19903, ISO 19904-1, ISO 19905-1 and ISO 19906, which give requirements for various forms of support structure. Requirements in this part of ISO 19901 concerning modifications and…
Information technology — Security techniques — Guidelines for auditors on information security contr...
ISO/IEC TR 27008:2011 provides guidance on reviewing the implementation and operation of controls, including technical compliance checking of information system controls, in compliance with an organization's established information security standards.
ISO/IEC TR 27008:2011 is applicable to all types and sizes of organizations, including public and private companies, government entities, and…
Information technology - Security techniques - Guidelines for auditors on information security contr...
ISO/IEC TR 27008:2011 provides guidance on reviewing the implementation and operation of controls, including technical compliance checking of information system controls, in compliance with an organization's established information security standards.
ISO/IEC TR 27008:2011 is applicable to all types and sizes of organizations, including public and private companies, government entities, and…
Information technology — JPSearch — Part 2: Registration, identification and management of schema an...
ISO/IEC 24800-2:2011 specifies a series of interfaces to allow disparate systems an interoperable management of image repositories. It also specifies the general rules which govern the usage of metadata in JPSearch and provides a specification which
provides rules for the representation of image metadata descriptions, consisting of the definition of the JPSearch Core Metadata Schema,
provides…
Information technology - JPSearch - Part 2: Registration, identification and management of schema an...
ISO/IEC 24800-2:2011 specifies a series of interfaces to allow disparate systems an interoperable management of image repositories. It also specifies the general rules which govern the usage of metadata in JPSearch and provides a specification which
provides rules for the representation of image metadata descriptions, consisting of the definition of the JPSearch Core Metadata Schema,
provides…
1 Scope
1.1
This Standard covers the design, construction, operation, and maintenance of oil and gas industry pipeline
systems that convey
(a) liquid hydrocarbons, including crude oil, multiphase fluids, condensate, liquid petroleum products,
natural gas liquids, and liquefied petroleum gas;
(b) oilfield water;
(c) oilfield steam;
(d) carbon dioxide used in oilfield enhanced recovery schemes;…
Information technology — Security techniques — Information security risk management
ISO/IEC 27005:2011 provides guidelines for information security risk management.
It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete…
Information technology - Security techniques - Information security risk management
ISO/IEC 27005:2011 provides guidelines for information security risk management.
It supports the general concepts specified in ISO/IEC 27001 and is designed to assist the satisfactory implementation of information security based on a risk management approach.
Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete…