{"id":2,"date":"2008-02-24T23:25:26","date_gmt":"2008-02-24T15:25:26","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/02\/24\/iso27001-cns27001-isms\/"},"modified":"2023-01-04T21:53:46","modified_gmt":"2023-01-04T13:53:46","slug":"iso27001-cns27001-isms","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=2","title":{"rendered":"ISO 27001\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u5c0e\u5165\u8207\u9867\u554f\u670d\u52d9"},"content":{"rendered":"<p><span style=\"font-size: 10pt;\">\u8cfd\u535a\u97d3\u7279\u79d1\u6280\u6709\u9650\u516c\u53f8(\u00a0Cyberhunter Inc., \u4ee5\u4e0b\u7c21\u7a31Cyberhunter)\u81ea\u516c\u53f8\u6210\u7acb\u4ee5\u4f86\uff0c\u5354\u52a9\u653f\u5e9c\u8207\u6c11\u9593\u4f01\u696d\u5efa\u7acb\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71 ( ISO 27001:2013 \/ CNS 27001:2014 \/ ISMS )\uff0c\u6709\u6548\u964d\u4f4e\u904b\u7528\u8cc7\u8a0a\u79d1\u6280\uff0c\u4f8b\u5982\uff1a\u96f2\u7aef (Cloud computing)\u3001\u884c\u52d5\u5b89\u5168(Mobile security)\u3001\u6316\u7926(Mining)\u7b49\u6240\u5e36\u4f86\u4e4b\u98a8\u96aa\uff0c\u85c9\u7531 ISO 27001 \/ CNS\u00a0 27001\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u7684\u5c0e\u5165\uff0c\u4ee5\u4eba\u54e1\u7ba1\u7406\u70ba\u4e3b\u8ef8\uff0c\u6d41\u7a0b\u7ba1\u63a7\u70ba\u4f9d\u6b78\uff0c\u642d\u914d\u6280\u8853\u79d1\u6280\u7684\u904b\u7528\uff0c\u9075\u5faa\u570b\u969b ISO\u6a19\u6e96\u63a1\u7528\u4e4b\u6234\u660e\u5faa\u74b0 (Deming Cycle) \uff0c\u4e5f\u5c31\u662fPlan-Do-Check-Act\u7ba1\u7406\u5faa\u74b0\uff0c\u900f\u904e ISO 31000 \u98a8\u96aa\u7ba1\u7406\uff0d\u539f\u5247\u8207\u6307\u5c0e\u7db1\u8981\uff0c\u9032\u884c\u6709\u6548\u7387\u8207\u7cfb\u7d71\u5316\u7684\u98a8\u96aa\u7ba1\u7406\uff0c\u91cf\u8eab\u5efa\u7f6e\u6709\u6548\u7387\u8207\u6548\u80fd\u4e4b\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\uff0c\u4e26\u8b93\u653f\u5e9c\u8207\u6c11\u9593\u4f01\u696d\u53d6\u5f97\u4e16\u754c\u77e5\u540d\u4e4bISO 27001\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u9a57\u8b49\u3002<\/span><\/p>\n<p><span style=\"font-size: 10pt;\">ISO27001\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u4e4b\u8a2d\u8a08\u91cd\u9ede\uff0c\u5728\u78ba\u4fdd\u9078\u64c7\u9069\u5207\u7684\uff0c\u4e14\u7b26\u5408\u4f01\u696d\u9700\u6c42\u8207\u98a8\u96aa\u7ba1\u63a7\u8981\u6c42\u4e4b\u5b89\u5168\u63a7\u5236\u63aa\u65bd\uff0c\u4ee5\u4fdd\u8b77\u8cc7\u8a0a\u8cc7\u7522\uff0c\u4e26\u589e\u52a0\u5f80\u4f86\u5ee0\u5546\u3001\u5ba2\u6236\u3001\u6c11\u773e\u4fe1\u5fc3\u3002<\/span><\/p>\n<p><span style=\"font-size: 10pt;\">\u884c\u653f\u9662\u570b\u5bb6\u8cc7\u901a\u5b89\u5168\u6703\u5831\u570b\u5bb6\u8cc7\u901a\u8a0a\u5b89\u5168\u767c\u5c55\u65b9\u6848(106-109\u5e74) \uff0c\u6301\u7e8c\u63a8\u52d5\u653f\u5e9cA\u3001B\u3001C+\u7b49\u7d1a\u901a\u904e\u4e26\u7dad\u8b77ISO 27001\u8b49\u66f8\u4e4b\u6709\u6548\u6027\uff0c\u672a\u4f86\u8cc7\u901a\u5b89\u5168\u7ba1\u7406\u6cd5\u9069\u7528\u7684\u6c11\u9593\u4f01\u696d\uff0c\u4e5f\u9700\u8981\u843d\u5be6\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u4e4b\u8cac\u4efb\u3002\u8cfd\u535a\u97d3\u7279\u64c1\u6709\u8c50\u5bcc\u4e4b\u7d93\u9a57\uff0c\u53ef\u4ee5\u5354\u52a9\u5ba2\u6236\u5728AI\u6642\u4ee3\uff0c\u5efa\u7acb\u5b89\u5168\u8207\u7b26\u5408\u71df\u904b\u65b9\u5411\u7684\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\uff0c\u6210\u70ba\u4f01\u696d\u6210\u9577\u7684\u6700\u4f73\u4f19\u4f34\u4e4b\u4e00\u3002<\/span><\/p>\n<p><span style=\"font-size: 10pt;\">\u76f8\u95dc\u6587\u7ae0\u9023\u7d50\uff1a<\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><a href=\"http:\/\/localhost\/portal\/2017\/03\/12\/iso-iec-27006-2015\/\">ISO\/IEC 27006\u8b93ISO 27001\u8a8d\u8b49\u8cbb\u7528\u589e\u52a0<\/a><\/span><\/p>\n<p><span style=\"font-size: 10pt;\"><a href=\"http:\/\/localhost\/portal\/2010\/08\/04\/iso27001consultant\/\">ISO27001\u7684\u7b2c\u4e00\u6b65\u5982\u4f55\u6311\u9078\u8f14\u5c0e\u9867\u554f<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8cfd\u535a\u97d3\u7279\u79d1\u6280\u6709\u9650\u516c\u53f8(\u00a0Cyberhunter Inc., \u4ee5\u4e0b\u7c21\u7a31Cyberhunter)\u81ea\u516c\u53f8\u6210\u7acb\u4ee5\u4f86\uff0c\u5354 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[56],"class_list":["post-2","post","type-post","status-publish","format-standard","hentry","category-2","tag-iso27001-cns27001-27001-isms"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2"}],"version-history":[{"count":1,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2\/revisions"}],"predecessor-version":[{"id":1520,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/2\/revisions\/1520"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}