The following describes the differences between ISMS and graded protection What are the correct options? (multiple selection).
A.
The construction result of 1SMS is to establish a set of ISMS system documents for the organization Strongly strengthen the Organization's information security, and the result of the rating assessment is to give whether the subject meets the stated security level requirements.
A.
The construction result of 1SMS is to establish a set of ISMS system documents for the organization Strongly strengthen the Organization's information security, and the result of the rating assessment is to give whether the subject meets the stated security level requirements.
B.
The graded protection system is a basic system for ensuring information security Both technology and qualifications are taken into account The focus is on how to leverage existing sophisticated protection critical information systems It mainly reflects the classification of hierarchies Protect the idea of focus. While ISMS is mainly from the perspective of security management The focus is on the establishment of information security guidelines, policies and security management systems and security management organizations within the organization or its specific scope, and their effective implementation, which mainly reflects the role and importance of security management.
B.
The graded protection system is a basic system for ensuring information security Both technology and qualifications are taken into account The focus is on how to leverage existing sophisticated protection critical information systems It mainly reflects the classification of hierarchies Protect the idea of focus. While ISMS is mainly from the perspective of security management The focus is on the establishment of information security guidelines, policies and security management systems and security management organizations within the organization or its specific scope, and their effective implementation, which mainly reflects the role and importance of security management.
C.
The implementation objects of graded protection are mainly those of various enterprise units, while the implementation objects of ISMS are mainly government departments such as party and government organs at all levels that have the requirements of information system levels.
C.
The implementation objects of graded protection are mainly those of various enterprise units, while the implementation objects of ISMS are mainly government departments such as party and government organs at all levels that have the requirements of information system levels.
D.
The complete implementation process of ISMS runs through the entire life cycle of the information system The complete implementation process of graded protection runs through the entire life cycle of the management system of the organization or a specific scope of the organization , and can be synchronized with the management system of a specific scope of the organization or organization. It can also be carried out on the basis that its management system has been established.
D.
The complete implementation process of ISMS runs through the entire life cycle of the information system The complete implementation process of graded protection runs through the entire life cycle of the management system of the organization or a specific scope of the organization , and can be synchronized with the management system of a specific scope of the organization or organization. It can also be carried out on the basis that its management system has been established.
Suggested answer: A, B
Question