共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
新版GB/T28001—2011《职业健康安全管理体系要求》国家标准于2012年2月1日开始实施。根据国家认监委的要求,自2013年1月1日起,认证机构不再颁发原2001版标准认证证书。2014年1月1日前,已经获得的职业健康安全管理体系认证证书全部要转化到2011版。这意味着,今明两年“证书转换”将是职业健康安全管理体系认证工作的一个重点。本期特推出“新版职业健康安全管理体系国家标准的理解与实施”专题,从新版标准的背景、实施要求以及与上版标准的差异等方面进行了介绍,以便企业理解其中几个最重要的变化,顺利完成换版工作。 相似文献
3.
4.
信息安全管理体系简称(ISMS),ISMS认证所依据的ISO/IEC27001:2005现在已等同转化为国家标准。本文将介绍ISMS标准的发展历程、标准族的框架结构以及在我国各行业的实施情况。一、信息安全管理体系标准化发展过程 相似文献
5.
一、转换综述现有质量管理体系文件向新版标准过渡 ,可分三个步骤 :1.0 根据 2 0 0 0版ISO90 0 1标准相关条款中新增或变化的要求 ,在现有程序中更新相关内容 ;2 .0 根据新版标准增加的条款 (要素 ) ,编制新的程序文件 ;3 .0 增设“管理职责 ,资源管理 ,产品实现 ,测量、分析和改进”四个“主程序” ,对上述程序文件未能涵盖的新版标准内容进行描述 ,同时给出查询所有现有程序文件的途径。四个主程序也可直接作为质量手册中质量体系要素描述部分的内容。 (即对质量管理体系所包括的过程顺序和相互作用的描述 )在以上三个步骤的基础上 … 相似文献
6.
7.
为了更好地指导ISO/IEC27001:2005《信息安全管理体系-基本要求》的设计和实施,新的标准ISO/IEC27003:2010《信息技术——安全技术——信息安全管理体系实施指南》于近日发布实施。该标准广泛适用于各类具有安全意识的组织机构,不论其规模、复杂程度和风险大小。 相似文献
8.
<正>新版ISO9001标准今年9月推出伴随着日前在爱尔兰高威召开的第6次ISO9001修订工作会落下帷幕,全球应用范围最广的质量管理体系标准ISO9001的第4次"升级",完成对各成员国最后一次意见征集,开始形成最终国际标准草案(FDIS版)。按照计划,新版ISO9001国际标准将于2015年9月份正式发布。作为全球最具影响力的质量管理体系标准,ISO9001自1987年问世以来,先后在1994年、2000年、2008年经历了3次改版"升级"。根据ISO2013年11月发布的统计数据, 相似文献
9.
描述新版ISO/CD 9001标准结构和章节特点,并着重分析依据过程模式编写的新版ISO/CD 9001的关注点,以及后续获证组织进行标准换版和管理体系整合时应重点关注的过程风险和过程绩效。 相似文献
10.
11.
The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliable services focused on security internalization, it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment information in medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes. 相似文献
12.
在介绍现代通信技术、智能测控技术、自动控制技术等领域最新成果的基础上,采用自主研发的基于SWCC协议的开放接入信息平台,运用ZigBee无线传感器网络实现信息的传递,有效解决了不同厂家、不同接口监测设备的信息接入问题.使用嵌入式系统数据存储方法,在提供Web互联网服务的同时,消除了系统数据存储过程的安全隐患.遵循实用性、可扩展性、开放性、标准性、规范性、专业性和经济性的系统设计原则,进行了卷烟企业动力能源信息管理系统的研制. 相似文献
13.
14.
The development of the Internet of Things (IoT) calls for a comprehensive information security evaluation framework to quantitatively measure the safety score and
risk (S&R) value of the network urgently. In this paper, we summarize the architecture
and vulnerability in IoT and propose a comprehensive information security evaluation
model based on multi-level decomposition feedback. The evaluation model provides an
idea for information security evaluation of IoT and guides the security decision maker for
dynamic protection. Firstly, we establish an overall evaluation indicator system that
includes four primary indicators of threat information, asset, vulnerability, and
management, respectively. It also includes eleven secondary indicators of system
protection rate, attack detection rate, confidentiality, availability, controllability,
identifiability, number of vulnerabilities, vulnerability hazard level, staff organization,
enterprise grading and service continuity, respectively. Then, we build the core algorithm
to enable the evaluation model, wherein a novel weighting technique is developed and a
quantitative method is proposed to measure the S&R value. Moreover, in order to better
supervise the performance of the proposed evaluation model, we present four novel
indicators includes residual risk, continuous conformity of residual risk, head-to-tail
consistency and decrease ratio, respectively. Simulation results show the advantages of
the proposed model in the evaluation of information security for IoT. 相似文献
15.
16.
Hyper-connectivity in Industry 4.0 has resulted in not only a rapid increase in the amount of information, but also the expansion of areas and assets to be protected. In terms of information security, it has led to an enormous economic cost due to the various and numerous security solutions used in protecting the increased assets. Also, it has caused difficulties in managing those issues due to reasons such as mutual interference, countless security events and logs’ data, etc. Within this security environment, an organization should identify and classify assets based on the value of data and their security perspective, and then apply appropriate protection measures according to the assets’ security classification for effective security management. But there are still difficulties stemming from the need to manage numerous security solutions in order to protect the classified assets. In this paper, we propose an information classification management service based on blockchain, which presents and uses a model of the value of data and the security perspective. It records transactions of classifying assets and managing assets by each class in a distributed ledger of blockchain. The proposed service reduces assets to be protected and security solutions to be applied, and provides security measures at the platform level rather than individual security solutions, by using blockchain. In the rapidly changing security environment of Industry 4.0, this proposed service enables economic security, provides a new integrated security platform, and demonstrates service value. 相似文献
17.
Ning Liu 《工程管理前沿(英文版)》2015,2(4):331
The paper presents a study based on the observation of public security programme situations.Nowadays, public security management is faced with challenges such as the increase in non-traditional safety threats, high occurrence probability, obvious complex chain reactions, high security demand, vulnerable bearing systems and world-wide influences. For the new adapted requirements of public security management, this paper puts forward the concept of the coordinated routine and emergency management, which combines the routine management at normal status and the emergency management at the abnormal status based on the whole process of public security management. This paper analyzes the coordinated management system and establishes the decision-making objectives, decision-making model and constraints. In addition, this paper proposes the basic strategy of achieving the coordinated management of public security. 相似文献
18.
19.