![](/Images/spacer.gif) |
![](/Images/menu_shadow.gif)
![](/Images/menu_shadow.gif)
|
![](/Images/spacer.gif) |
Item Details
Title:
|
INFORMATION SECURITY BREACHES
AVOIDANCE AND TREATMENT BASED ON ISO27001 |
By: |
Michael Krausz |
Format: |
Electronic book text |
![](/Images/divider_itemdetail_1a.gif)
List price:
|
£11.95 |
We currently do not stock this item, please contact the publisher directly for
further information.
|
|
|
|
|
ISBN 10: |
1849280282 |
ISBN 13: |
9781849280280 |
Publisher: |
IT GOVERNANCE PUBLISHING |
Pub. date: |
10 December, 2009 |
Pages: |
56 |
Description: |
Although breaches of information security are not a new phenomenon, the methods used to perpetrate such breaches have changed considerably over the years. This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. |
Synopsis: |
Although breaches of information security are not a new phenomenon, the methods used to perpetrate such breaches have changed considerably over the years. Leaking information to non-authorised people has always been an issue but, in the computer age, the speed and effectiveness with which breaches of information security can occur, and the amount of harm potentially caused are disturbing. Typically, also, they favour the perpetrator, not the victim. Modern companies depend on their IT systems, and it is clear that special care needs to be taken to keep systems safe and secure. In this guide, we focus solely on the aspects of re-establishing that safety and security once, despite all measures taken, a breach has occurred. We put breaches of information security in the context of ISO27001 which, since its inception as former British Standard 7799 in the late eighties, has provided a framework of requirements well suited to the effective implementation of counter-measures and measures designed to protect information in all its forms (whether on paper, in the spoken word, or within the IT sphere).This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. It provides input for decision making and breach classification, and case studies where the reader can check out how other companies were affected and what they did, or did not do, upon becoming the victim of a breach. |
Publication: |
UK |
Imprint: |
IT Governance Publishing |
Returns: |
Non-returnable |
|
|
|
![](/images/spacer.gif) |
![](images/menu_shadow2.gif)
Ramadan and Eid al-Fitr
A celebratory, inclusive and educational exploration of Ramadan and Eid al-Fitr for both children that celebrate and children who want to understand and appreciate their peers who do.
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
![](/Images/menu_shadow2left.gif)
|
|
![](/Images/spacer.gif) |