Information Security Breaches Avoidance and Treatment based on ISO27001

Uses real-life information security incidents to explain how to reduce the risks of information security breaches and, crucially, what to do when they occur. Now updated to cover ISO27001:2013.

Detalles Bibliográficos
Autor principal: Krausz, Michael (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Ely : IT Governance Ltd 2014.
Edición:2nd ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629395206719
Tabla de Contenidos:
  • Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 - small company; Case study 2 - small company; Case study 3 - medium-sized company; Case study 4 - large company; ITG Resources