• :  
BM ENG
  • Subscription
  • MS Catalogue
  • MS Pack
  • Purchase History
  • Cart
  • Hi
    !
    • My Profile
    • Portal
    • Log Out

Modal title

Widget settings form goes here

Search Malaysian Standard (MS)
 Advanced Search Search


Information technology - Security techniques - Information security risk management (First revision (ISO/IEC 27005:2011, IDT)
MS ISO/IEC 27005:2012
Status : 1st Revision
Format : PDF

This Malaysian Standard provides guidelines for information security risk management.

This Malaysian Standard supports the general concepts specified in ISO/IEC 27001 and is designed to ....Read more
assist the satisfactory implementation of information security based on a risk management approach.

Knowledge of the concepts, models, processes and terminologies described in ISO/IEC 27001 and ISO/IEC 27002 is important for a complete understanding of this Malaysian Standard.

This Malaysian Standard is applicable to all types of organizations (e.g. commercial enterprises,
government agencies, non-profit organizations) which intend to manage risks that could compromise the organization’s information security.
Close

RM 120.00

Document will be sent via email



 Add To Cart

Information technology - Security techniques - Information security management - Measurement (ISO/IEC 27004:2009, IDT)
MS ISO/IEC 27004:2014
Status : Original
Format : PDF

This Malaysian Standard is to provide guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISM ....Read more S) and controls or groups of controls, as specified in MS ISO/IEC 27001. Close

RM 105.00

Document will be sent via email



 Add To Cart

Information technology - Security techniques - Information security management system implementation guidance (ISO/IEC 27003:2010, IDT)
MS ISO/IEC 27003:2014
Status : Original
Format : PDF

This Malaysian Standard is to focuses on the critical aspects needed for successful design and implementation of an Information Security Management System (ISMS) in accordance with MS ISO/IEC 27001. I ....Read more t describes the process of ISMS specification and design from inception to the production of implementation plans. It describes the process of obtaining management approval to implementing ISMS by defining ISMS scope, boundaries and policy. Followed by conducting information security requirements analysis, risk assessment and establishment of risk treatment plan.

This document provides more elaborated explanation on the approach of defining the scope of ISMS, which complements ISO/IEC 27001.
Close

RM 120.00

Document will be sent via email



 Add To Cart

Information technology - Security techniques - Code of practice for information security controls (First revision) (ISO/IEC 27002:2013, IDT) (Published by STANDARDS MALAYSIA in 2014)
MS ISO/IEC 27002:2013
Status : 1st Revision
Format : PDF

This standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking ....Read more into consideration the organization's information security risk environment(s).

It is designed to be used by organizations that intend to:

1.select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001;
2.implement commonly accepted information security controls;
3.develop their own information security management guidelines.
Close

RM 135.00

Document will be sent via email



 Add To Cart

Information technology - Security techniques - Code of practice for information security controls (First revision) (ISO/IEC 27002:2013, IDT) (Published by Standards Malaysia in 2014) TECHNICAL CORRIGENDUM 1
MS ISO/IEC 27002:2013, COR.1: 2016
Status : Amendment 1
Format : PDF

This standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking ....Read more into consideration the organization's information security risk environment(s).

It is designed to be used by organizations that intend to:

1.select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001;

2.implement commonly accepted information security controls;

3.develop their own information security management guidelines.
Close

FREE

Document will be sent via email



 Send To Email

Teknologi maklumat - Teknik keselamatan - Kod amalan untuk kawalan keselamatan maklumat (Semakan pertama) (ISO/IEC 27002:2013, IDT) (Diterbitkan oleh Jabatan Standard Malaysia pada tahun 2017)
MS ISO/IEC 27002:2013 (BM)
Status : 1st Revision
Format : PDF

This standard gives guidelines for organizational information security standards and information security management practices including the selection, implementation and management of controls taking ....Read more into consideration the organization's information security risk environment(s).

It is designed to be used by organizations that intend to:

1.select controls within the process of implementing an Information Security Management System based on ISO/IEC 27001;
2.implement commonly accepted information security controls;
3.develop their own information security management guidelines.
Close

RM 165.00

Document will be sent via email



 Add To Cart

Information technology- Security techniques - Information security management systems - Requirements (First revision) (ISO/IEC 27001:2013, IDT) (Published by STANDARDS MALAYSIA in 2014)
MS ISO/IEC 27001:2013
Status : 1st Revision
Format : PDF

Specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requ ....Read more irements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Close

RM 45.00

Document will be sent via email



 Add To Cart

Information technology - Security techniques - Information security management systems - Requirements (First revision) (ISO/IEC 27001:2013, IDT) (Published by Standards Malaysia in 2014) TECHNICAL CORRIGENDUM 1
MS ISO/IEC 27001:2013, COR 1:2016
Status : Amendment 1
Format : PDF

Specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization. It also includes requ ....Read more irements for the assessment and treatment of information security risks tailored to the needs of the organization. The requirements set out in ISO/IEC 27001:2013 are generic and are intended to be applicable to all organizations, regardless of type, size or nature. Close

FREE

Document will be sent via email



 Send To Email

Teknologi maklumat - Teknik keselamatan - Sistem pengurusan keselamatan maklumat - Keperluan (Semakan pertama) (ISO/IEC 27001:2013, IDT) (Diterbitkan oleh Jabatan Standard Malaysia pada tahun 2017)
MS ISO/IEC 27001:2013 (BM)
Status : 1st Revision
Format : PDF

Standard Antarabangsa ini menetapkan keperluan bagi mewujudkan, melaksanakan, menyenggara dan menambah baik secara berterusan sistem pengurusan keselamatan maklumat mengikut konteks organisasi. Standa ....Read more rd Antarabangsa ini juga memasukkan keperluan untuk pentaksiran dan penguraian risiko keselamatan maklumat yang disesuaikan dengan keperluan organisasi. Keperluan yang ditetapkan dalam Standard Antarabangsa ini adalah umum dan bertujuan untuk digunakan oleh semua organisasi, tanpa mengira jenis, saiz atau ciri. Pengecualian sebarang keperluan yang ditetapkan dalam Klausa 4 hingga 10 tidak boleh diterima apabila sesebuah organisasi mendakwa memenuhi Standard Antarabangsa ini. Close

RM 60.00

Document will be sent via email



 Add To Cart

Adhesives - Test methods for the evaluation and selection of adhesives for indoor wood products - Part 1: Resistance to delamination in non-severe environments (ISO 26842-1:2009, IDT)
MS ISO 26842-1:2011 (CONFIRMED:2020)
Status : 1st Confirmation
Format : PDF

This Malaysian Standard specifies guidelines for the selection, by means of delamination-resistance tests, of adhesives for use in wood products placed in non-severe environments, indoors or during tr ....Read more ansport, in which the products are not exposed to extreme changes in temperature and humidity.

A series of exposure cycles at various temperatures and humidities is provided to verify that the adhesive selected, or a product bonded with the adhesive, meets the necessary requirements for resistance to delamination.

This standard is intended to help the user not only to select a suitable adhesive but also to evaluate adhesives and adhesively bonded wood products.

NOTE: When actual wood products are tested using this method, the test results may not be comparable due to the fact that the test laboratory will not normally have had adequate control over the way the product was assembled.

This standard is not intended for use in the qualification of structural components.
Close

RM 15.00

Document will be sent via email



 Add To Cart

  • ‹
  • 1
  • 2
  • ...
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • ...
  • 580
  • 581
  • ›