The development of an Information Security Management System (ISMS) that could be independently audited and certified grew from a series of initiatives sponsored by ISO.
- Compare the business and technical drivers behind ISO27001, ISO27002 and at least two other similar quality systems.
- Identify the barriers to implementing the quality systems and the benefits that can be derived.
- From research, describe the information security goals met by one Australian or international organisation who has implemented one of the quality systems and been certified against it.
- Based on your lab experience, describe the barriers to creating a detailed Threat Risk Assessment and describe the processes required to ensure that Information Assets are suitably protected.
Length: 5,000 words, not including appendixes/references