Information Security Breaches Avoidance and Treatment based on ISO27001
Uses real-life information security incidents to explain how to reduce the risks of information security breaches and, crucially, what to do when they occur. Now updated to cover ISO27001:2013.
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Ely :
IT Governance Ltd
2014.
|
Edición: | 2nd ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629395206719 |
Tabla de Contenidos:
- Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 - small company; Case study 2 - small company; Case study 3 - medium-sized company; Case study 4 - large company; ITG Resources