{"id":599,"date":"2009-12-18T08:14:48","date_gmt":"2009-12-18T00:14:48","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/12\/18\/isoiec-270042009\/"},"modified":"2009-12-18T08:14:48","modified_gmt":"2009-12-18T00:14:48","slug":"isoiec-270042009","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=599","title":{"rendered":"ISO\/IEC 27004:2009 \u7d42\u65bc\u767c\u5e03\u4e86"},"content":{"rendered":"<h4>ISO 27004 \u5c31\u662fInformation technology &#8212; Security techniques &#8212; Information security management &#8212; Measurement\uff0c\u4e3b\u8981\u662f\u91dd\u5c0d\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u672c\u6587\u63d0\u5230\u7684\u91cf\u6e2c\uff0c\u9032\u884c\u88dc\u5145\u8aaa\u660e\u3002<\/h4>\n<p>\u4ee5\u5f80\u6b64\u4efd\u6587\u4ef6\u9084\u6c92\u6709\u51fa\u4f86\u6642\uff0c\u9047\u5230\u4e0d\u540c\u9a57\u8b49\u6a5f\u69cb\uff0c\u5c0d\u65bcISO 27001\u6240\u63d0\u5230\u7684Measure\uff0c\u6709\u4e0d\u540c\u7684\u898b\u89e3\uff0c\u9020\u6210\u5404\u8aaa\u5404\u8a71\uff0c\u73fe\u5728\uff0cISO\/IEC 27004:2009\u5728\u4eca\u5e7412\u67087\u65e5\u767c\u5e03\uff0c\u8b93\u65e5\u5f8c\u8cc7\u8a0a\u5b89\u5168\u7ba1\u7406\u7cfb\u7d71\u7684\u91cf\u6e2c\uff0c\u6709\u4e00\u500b\u4e00\u81f4\u6027\u7684\u6307\u5f15\uff0c\u4ee5\u6e1b\u5c11\u8981\u5c0e\u5165ISO 27001\u7684\u6a5f\u69cb\uff0c\u9047\u5230\u4e0d\u540c\u7a3d\u6838\u54e1\uff0c\u9762\u81e8\u4e0d\u540c\u91cf\u6e2c\u8981\u6c42\u60c5\u5f62\u3002<\/p>\n<p>\u4ee5\u4e0b\u662f<a target=\"_blank\" href=\"http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=42106\" rel=\"noopener\">ISO<\/a>\u5c0d\u65bc\u6b64\u6a19\u6e96\u7684\u7c21\u4ecb\uff1a<\/p>\n<p>\nISO\/IEC 27004:2009 provides guidance on the development and use of measures and measurement in order to assess the effectiveness of an implemented information security management system (ISMS) and controls or groups of controls, as specified in ISO\/IEC 27001.<\/p>\n<p>ISO\/IEC 27004:2009 is applicable to all types and sizes of organization.<br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>ISO 27004 \u5c31\u662fInformation technology &#8212; Security tec [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[97,96,93,98,94,95],"class_list":["post-599","post","type-post","status-publish","format-standard","hentry","category-iso-27001","tag-cns27001","tag-iso27001","tag-iso27004","tag-measure","tag-94","tag-95"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/599","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=599"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/599\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=599"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=599"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=599"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}