SlideShare a Scribd company logo
1 of 378
…
…
…

PC   BBS
…

PC   BBS
…

PC   BBS
…

PC   BBS



               …
…

PC   BBS



                  …
           ISMS
…

PC   BBS



                  …
           ISMS
…
ISMS
ISMS
       …
“the state of free from danger or
threat”
“the state of free from danger or
threat”
        securus
“the state of free from danger or
threat”
        securus
  se (without) - cura (care)
“the state of free from danger or
threat”
        securus
  se (without) - cura (care)
“the state of free from danger or
threat”
        securus
  se (without) - cura (care)
IT
IT
IT
IT
IT
IT
IT
etc...
etc...
(   )
etc...
(   )
etc...
(   )
etc...
(   )
etc...
(   )
IDS
IDS
IDS
(confidentiality)
(confidentiality)
(confidentiality)

(integrity)
(confidentiality)

(integrity)
(confidentiality)

(integrity)

(availability)
(confidentiality)

(integrity)

(availability)
24h / 365
24h / 365
asahi.com
asahi.com
…           …




Wikipedia
…           …




Wikipedia
…           …




Wikipedia
…           …
            …




Wikipedia
…           …
            …




Wikipedia
…               …
                …




            …


Wikipedia
…               …
                …




            …


Wikipedia
Smith & Wesson
…
…
…
…
…
…




    ”The Net”
…




    ”The Net”
…
…
…
…




…
…




…
…
…
…
…
…
…
…
…
(   )
(   )
(   )
(   )
(   )
(   )
(   )
ISO/IEC 15408:1999
ISO/IEC 15408:1999
                     (CC) etc...
ISO/IEC 15408:1999
                     (CC) etc...
ISO/IEC 15408:1999
                     (CC) etc...
ISO/IEC 15408:1999
                     (CC) etc...



ISO/IEC17799:2000
ISO/IEC 15408:1999
                     (CC) etc...



ISO/IEC17799:2000
   JIS X 5080:2002
ISO/IEC 15408:1999
                     (CC) etc...



ISO/IEC17799:2000
   JIS X 5080:2002
   ISMS            ver.2.0
ISO/IEC 15408:1999
                     (CC) etc...



ISO/IEC17799:2000
   JIS X 5080:2002
   ISMS            ver.2.0
                ISO/JIS X 27001:2006
ISMS
ISMS
ISMS

 Information Security Management
 System
ISMS

 Information Security Management
 System
    …                     …
ISMS

 Information Security Management
 System
    …                     …
ISMS

 Information Security Management
 System
    …                     …
(   )
(   )
(              )


    ISMS   …
(              )


    ISMS   …
ISMS
ISMS
ISMS
ISMS
ISMS
ISMS
ISMS
ISMS




       ISMS
ISMS
ISMS
ISMS

       …
ISMS

       …
ISMS

       …
ISMS

       …
ISMS

       …
ISMS




ISMS   (ver.2.0)
ISMS




ISMS   (ver.2.0)
ISMS
ISMS
ISMS
ISMS



PDCA
ISMS



PDCA
  Plan Do   Check   Act
ISMS



PDCA
  Plan Do   Check   Act
ISMS



PDCA
  Plan Do   Check   Act

 ISMS
PDCA
PDCA
Plan -
PDCA
Plan -
PDCA
Plan -


Do -
PDCA
Plan -


Do -
PDCA
Plan -


Do -
Check -
PDCA
Plan -


Do -
Check -
PDCA
Plan -


Do -
Check -

Act -
PDCA
Plan -


Do -
Check -

Act -
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
PDCA
Plan -
Plan -
Plan -
Plan -
Plan -
Plan -
Plan -
Plan -
Plan -
Do -
Do -
Do -
Do -
Do -
Do -
Do -
Do -
Check -
Check -
Check -

ISMS
Check -

ISMS
Check -

ISMS
Check -

ISMS
Check -

ISMS
Act -
Act -
Act -
Act -
Act -
Act -
ISMS
ISMS
1. ISMS
ISMS
1. ISMS
2. ISMS
ISMS
1. ISMS
2. ISMS
3.
ISMS
1. ISMS
2. ISMS
3.
4.
ISMS
1. ISMS
2. ISMS
3.
4.
5.
ISMS
1. ISMS
2. ISMS
3.
4.
5.
6.
ISMS
1. ISMS
2. ISMS
3.
4.
5.
6.
7.
ISMS
1. ISMS
2. ISMS
3.
4.
5.
6.
7.
8.
ISMS
1. ISMS
2. ISMS
3.
4.
5.
6.
7.
8.
9.
ISMS
ISMS
ISMS   -1
ISMS
ISMS        -1
       -2
ISMS
ISMS        -1
       -2
            - 3, 4
ISMS
ISMS        -1
       -2
            - 3, 4
              -5
ISMS
ISMS             -1
       -2
                 - 3, 4
                   -5
            -6
ISMS
ISMS              -1
        -2
                  - 3, 4
                    -5
             -6
       -7
ISMS
ISMS              -1
        -2
                  - 3, 4
                    -5
             -6
       -7
        -8
ISMS   -1
ISMS   -1
ISMS   -1
ISMS   -1
ISMS   -1
ISMS   -1
ISMS   -1
ISMS   -1
-2
-2

1.
-2

1.
2.
-2

1.
2.
3.
-2

1.
2.
3.
4.
-2

1.
2.
3.
4.
5.
-1
-1
     - 2, 3, 4
-1
      - 2, 3, 4
-5
-1
      - 2, 3, 4
-5
-1
          - 2, 3, 4
 -5


A4
-1
          - 2, 3, 4
 -5


A4
                      ^^;
- 3, 4
- 3, 4
- 3, 4
- 3, 4
- 3, 4
- 3, 4
- 3, 4
- 3, 4




etc...
- 3, 4




etc...
- 3, 4
- 3, 4
- 3, 4

…
- 3, 4

       …
ISMS
- 3, 4

       …
ISMS
- 3, 4

       …
ISMS
- 3, 4

       …
ISMS
- 3, 4

       …
ISMS
(   )
(   )
(   )
(   )
…
…
…

…
…

…
…

…

…
…

…

…
MTBF
MTBF
ISMS   Ver. 2.0
ISMS   Ver. 2.0
ISMS   Ver. 2.0
ISMS      Ver. 2.0




       etc...
…
…


…
…


…


…
…
ISMS
ISMS
ISMS
ISMS
ISMS
PDCA
PDCA
Q&A?

More Related Content

Viewers also liked

Pasha Sulina – Incursiune într-un loc fermecat
Pasha Sulina – Incursiune într-un loc fermecatPasha Sulina – Incursiune într-un loc fermecat
Pasha Sulina – Incursiune într-un loc fermecateComunitate.ro
 
Pleasantview Novella: Chapter 11
Pleasantview Novella: Chapter 11Pleasantview Novella: Chapter 11
Pleasantview Novella: Chapter 11holleyberry
 
Soil Presentation
Soil PresentationSoil Presentation
Soil PresentationTom_Yeager
 
Using Suffix Arrays for Efficient Recognition of Named Entities in Large Scale
Using Suffix Arrays for Efficient Recognition of Named Entities in Large ScaleUsing Suffix Arrays for Efficient Recognition of Named Entities in Large Scale
Using Suffix Arrays for Efficient Recognition of Named Entities in Large ScaleBenjamin Adrian
 
REVUE DE PRESSE DU 6 AVRIL 2010 (5)
REVUE DE PRESSE DU 6 AVRIL 2010 (5)REVUE DE PRESSE DU 6 AVRIL 2010 (5)
REVUE DE PRESSE DU 6 AVRIL 2010 (5)Capa presse tv
 
Regresi Nurjanah Baru
Regresi Nurjanah BaruRegresi Nurjanah Baru
Regresi Nurjanah Baruguestbed2c6
 
it's learning Road Map 2010_1
it's learning Road Map 2010_1it's learning Road Map 2010_1
it's learning Road Map 2010_1guestaf9323
 
DDRR Chapter Four
DDRR Chapter FourDDRR Chapter Four
DDRR Chapter Fourholleyberry
 
DDRR Chapter Five
DDRR Chapter FiveDDRR Chapter Five
DDRR Chapter Fiveholleyberry
 
Destinations and Tourism Marketing Turistico n.25
Destinations and Tourism Marketing Turistico n.25Destinations and Tourism Marketing Turistico n.25
Destinations and Tourism Marketing Turistico n.25FTourism & Marketing
 
Perusal (click on "Full" lower right)
Perusal (click on "Full" lower right)Perusal (click on "Full" lower right)
Perusal (click on "Full" lower right)nordtech
 
Social Studies chapter 2 lesson 1 Regional Differences Leon
Social Studies chapter 2 lesson 1  Regional Differences LeonSocial Studies chapter 2 lesson 1  Regional Differences Leon
Social Studies chapter 2 lesson 1 Regional Differences Leonincometz
 

Viewers also liked (20)

Pasha Sulina – Incursiune într-un loc fermecat
Pasha Sulina – Incursiune într-un loc fermecatPasha Sulina – Incursiune într-un loc fermecat
Pasha Sulina – Incursiune într-un loc fermecat
 
Generation of computers
Generation of computersGeneration of computers
Generation of computers
 
Gulpener Ppt 2010
Gulpener Ppt 2010Gulpener Ppt 2010
Gulpener Ppt 2010
 
Inclusió digital
Inclusió digitalInclusió digital
Inclusió digital
 
Pleasantview Novella: Chapter 11
Pleasantview Novella: Chapter 11Pleasantview Novella: Chapter 11
Pleasantview Novella: Chapter 11
 
Soil Presentation
Soil PresentationSoil Presentation
Soil Presentation
 
CUPE's Art Collection
CUPE's Art CollectionCUPE's Art Collection
CUPE's Art Collection
 
Using Suffix Arrays for Efficient Recognition of Named Entities in Large Scale
Using Suffix Arrays for Efficient Recognition of Named Entities in Large ScaleUsing Suffix Arrays for Efficient Recognition of Named Entities in Large Scale
Using Suffix Arrays for Efficient Recognition of Named Entities in Large Scale
 
REVUE DE PRESSE DU 6 AVRIL 2010 (5)
REVUE DE PRESSE DU 6 AVRIL 2010 (5)REVUE DE PRESSE DU 6 AVRIL 2010 (5)
REVUE DE PRESSE DU 6 AVRIL 2010 (5)
 
Regresi Nurjanah Baru
Regresi Nurjanah BaruRegresi Nurjanah Baru
Regresi Nurjanah Baru
 
it's learning Road Map 2010_1
it's learning Road Map 2010_1it's learning Road Map 2010_1
it's learning Road Map 2010_1
 
DDRR Chapter Four
DDRR Chapter FourDDRR Chapter Four
DDRR Chapter Four
 
Past continuous forms
Past continuous formsPast continuous forms
Past continuous forms
 
Present to be forms
Present to be formsPresent to be forms
Present to be forms
 
DDRR Chapter Five
DDRR Chapter FiveDDRR Chapter Five
DDRR Chapter Five
 
An Ova Rini
An Ova RiniAn Ova Rini
An Ova Rini
 
Destinations and Tourism Marketing Turistico n.25
Destinations and Tourism Marketing Turistico n.25Destinations and Tourism Marketing Turistico n.25
Destinations and Tourism Marketing Turistico n.25
 
Perusal (click on "Full" lower right)
Perusal (click on "Full" lower right)Perusal (click on "Full" lower right)
Perusal (click on "Full" lower right)
 
DDRR Chapter 12
DDRR Chapter 12DDRR Chapter 12
DDRR Chapter 12
 
Social Studies chapter 2 lesson 1 Regional Differences Leon
Social Studies chapter 2 lesson 1  Regional Differences LeonSocial Studies chapter 2 lesson 1  Regional Differences Leon
Social Studies chapter 2 lesson 1 Regional Differences Leon
 

More from Toshiboumi Ohta

eラーニングのWebアプリケーション edX とは?
eラーニングのWebアプリケーション edX とは?eラーニングのWebアプリケーション edX とは?
eラーニングのWebアプリケーション edX とは?Toshiboumi Ohta
 
edX は e-learning の夢を見るか?
edX は e-learning の夢を見るか?edX は e-learning の夢を見るか?
edX は e-learning の夢を見るか?Toshiboumi Ohta
 
ネットワーク設計と構築090530
ネットワーク設計と構築090530ネットワーク設計と構築090530
ネットワーク設計と構築090530Toshiboumi Ohta
 
セキュリティとコンプライアンスプログラムについて
セキュリティとコンプライアンスプログラムについてセキュリティとコンプライアンスプログラムについて
セキュリティとコンプライアンスプログラムについてToshiboumi Ohta
 
パッシブタップの製作
パッシブタップの製作パッシブタップの製作
パッシブタップの製作Toshiboumi Ohta
 

More from Toshiboumi Ohta (11)

科学技術と音楽
科学技術と音楽科学技術と音楽
科学技術と音楽
 
eラーニングのWebアプリケーション edX とは?
eラーニングのWebアプリケーション edX とは?eラーニングのWebアプリケーション edX とは?
eラーニングのWebアプリケーション edX とは?
 
edX は e-learning の夢を見るか?
edX は e-learning の夢を見るか?edX は e-learning の夢を見るか?
edX は e-learning の夢を見るか?
 
ネットワーク設計と構築090530
ネットワーク設計と構築090530ネットワーク設計と構築090530
ネットワーク設計と構築090530
 
個人情報保護法
個人情報保護法個人情報保護法
個人情報保護法
 
セキュそば20100213
セキュそば20100213セキュそば20100213
セキュそば20100213
 
2008後期社員総会
2008後期社員総会2008後期社員総会
2008後期社員総会
 
セキュリティとコンプライアンスプログラムについて
セキュリティとコンプライアンスプログラムについてセキュリティとコンプライアンスプログラムについて
セキュリティとコンプライアンスプログラムについて
 
セキュそば 090314
セキュそば 090314セキュそば 090314
セキュそば 090314
 
Tmug12
Tmug12Tmug12
Tmug12
 
パッシブタップの製作
パッシブタップの製作パッシブタップの製作
パッシブタップの製作
 

Recently uploaded

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiRaviKumarDaparthi
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAnitaRaj43
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)Wonjun Hwang
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...ScyllaDB
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfOverkill Security
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightSafe Software
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxFIDO Alliance
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfalexjohnson7307
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 

Recently uploaded (20)

Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Navigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi DaparthiNavigating the Large Language Model choices_Ravi Daparthi
Navigating the Large Language Model choices_Ravi Daparthi
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)CORS (Kitworks Team Study 양다윗 발표자료 240510)
CORS (Kitworks Team Study 양다윗 발표자료 240510)
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
Microsoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdfMicrosoft BitLocker Bypass Attack Method.pdf
Microsoft BitLocker Bypass Attack Method.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 

080610 jus ISMS