
{"id":351,"date":"2008-06-26T15:34:27","date_gmt":"2008-06-26T18:34:27","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/site\/?p=351"},"modified":"2008-06-26T15:37:17","modified_gmt":"2008-06-26T18:37:17","slug":"gaisp-y-gtag-principios-de-seguridad-generalmente-aceptados","status":"publish","type":"post","link":"https:\/\/www.talsoft.com.ar\/site\/es\/gaisp-y-gtag-principios-de-seguridad-generalmente-aceptados\/","title":{"rendered":"GAISP y GTAG: Principios de seguridad generalmente aceptados"},"content":{"rendered":"<p>La Gu\u00c3\u00ada <a href=\"http:\/\/all.net\/books\/standards\/GAISP-v30.pdf\">GAISP (Generally Accepted Information Security Principles) <\/a>es un proyecto de ISSA que ofrece los principios y buenas pr\u00c3\u00a1cticas recomendadas en Seguridad de la Informaci\u00c3\u00b3n.<\/p>\n<p>Su lectura es muy recomendable ya que trata temas como:<\/p>\n<p>PERVASIVE PRINCIPLES<br \/>\nBROAD FUNCTIONAL PRINCIPLES<br \/>\nDETAILED SECURITY PRINCIPLES<br \/>\nGUIDANCE FROM COMPUTERS AT RISK<br \/>\nGUIDELINES FOR THE SECURITY OF INFORMATION SYSTEMS<br \/>\nAdem\u00c3\u00a1s tambi\u00c3\u00a9n es recomendable la lectura del Compliance Frameworks tomado del Ap\u00c3\u00a9ndice D de <a href=\"http:\/\/www.theiia.org\/guidance\/technology\/gtag\/\">GTAG (Global Technology Audit Guide)<\/a>: Information Technology Controls, una breve gu\u00c3\u00ada de las buenas pr\u00c3\u00a1cticas m\u00c3\u00a1s comunes:<\/p>\n<p>COSO<br \/>\nCICA CoCo<br \/>\nCICA IT Control Guidelines<br \/>\nITGI Control Objectives for Information and Related Technology (CobiT)<br \/>\nISO 17799 (Code of Practice for Information Security Management)<br \/>\nISF Standard of Good Practice for Information Security<br \/>\nGenerally Accepted Information Security Principles (GAISP)<br \/>\nAICPA\/CICA Trust Services, Principles and, Criteria<br \/>\nIIA Systems Assurance and Control (SAC) 15.10 Corporate Governance<\/p>\n<p>Fuente: http:\/\/www.segu-info.com.ar\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Gu\u00c3\u00ada GAISP (Generally Accepted Information Security Principles) es un proyecto de ISSA que ofrece los principios y buenas pr\u00c3\u00a1cticas recomendadas en Seguridad de la Informaci\u00c3\u00b3n. Su lectura es muy recomendable ya que trata temas como: PERVASIVE PRINCIPLES BROAD FUNCTIONAL PRINCIPLES DETAILED SECURITY PRINCIPLES GUIDANCE FROM COMPUTERS AT RISK GUIDELINES FOR THE SECURITY OF INFORMATION [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-351","post","type-post","status-publish","format-standard","hentry","category-profesional"],"_links":{"self":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/comments?post=351"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/posts\/351\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/media?parent=351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/categories?post=351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft.com.ar\/site\/wp-json\/wp\/v2\/tags?post=351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}