data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_GV_RM_01_1

http://cyfun.data.gift/data/requirement_GV_RM_01_1
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ManagementAspects

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_KeyMeasures

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_GV.RM-01

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

GV.RM-01.1: Information/cybersecurity objectives shall be identified, agreed to by organisational stakeholders and approved by senior management

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

GV.RM-01.1

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p17

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p15

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.RM-01

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>To support this objective, organisations should:</p><ul><li>Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically:<ul><li>Clause 6.1 should be used to establish a structured risk assessment process.</li><li>Clause 6.3 should guide the definition of appropriate risk treatment strategies.</li></ul></li><li>Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes.</li><li>In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks.</li><li>Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems).</li><li>Use these objectives to measure and manage risk and performance across the organisation.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

To support this objective, organisations should: • Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically: o Clause 6.1 should be used to establish a structured risk assessment process. o Clause 6.3 should guide the definition of appropriate risk treatment strategies. • Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes. • In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks. • Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems). • Use these objectives to measure and manage risk and performance across the organisation.

note

A general note, for any purpose.

  • External link
  • Internal link

To support this objective, organisations should: - Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically: - Clause 6.1 should be used to establish a structured risk assessment process. - Clause 6.3 should guide the definition of appropriate risk treatment strategies. - Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes. - In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks. - Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems). - Use these objectives to measure and manage risk and performance across the organisation.

note

A general note, for any purpose.

  • External link
  • Internal link

To support this objective, organisations should: - Follow the risk management principles outlined in ISO/IEC 27005, which provide guidance on identifying, assessing, and mitigating information security risks. Specifically: - Clause 6.1 should be used to establish a structured risk assessment process. - Clause 6.3 should guide the definition of appropriate risk treatment strategies. - Update near-term and long-term information and cybersecurity objectives during annual strategic planning and in response to major organisational changes. - In OT-sector organisations, senior management should consider health, safety, and environmental factors when identifying risks. - Establish measurable (SMART) objectives for information and cybersecurity (e.g., improving user training quality, ensuring adequate protection for industrial control systems). - Use these objectives to measure and manage risk and performance across the organisation.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

GV.RM-01.1

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Cybersecurity objectives approval

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

Information/cybersecurity objectives shall be identified, agreed to by organisational stakeholders and approved by senior management

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ManagementAspects

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_KeyMeasures

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_IMPORTANT

  • External link
  • Internal link

http://cyfun.data.gift/ontology#isKeyMeasure

  • External link
  • Internal link

1

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

22

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 24 of 24

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.RM-01

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_GV.RM-01

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.