Information security breaches avoidance and treatment based on ISO27001

This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for th...

Descripción completa

Detalles Bibliográficos
Autor principal: Krausz, Michael (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Ely, U.K. : IT Governance Pub 2009.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627814206719
Tabla de Contenidos:
  • INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 - small company; Case study 2 - small company; Case study 3 - medium-sized company; Case study 4 - large company; ITG RESOURCES