Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
London
BSI
2014
|
Ausgabe: | Fourth edition |
Schriftenreihe: | Information security management systems guidance series
|
Schlagworte: | |
Online-Zugang: | TUM01 Volltext |
Beschreibung: | "ISO/IEC 27001:2013"--Foreword. - Previous edition: 2005 |
Beschreibung: | 1 Online-Ressource (viii, 131 Seiten) |
ISBN: | 0580829103 9780580829109 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042742361 | ||
003 | DE-604 | ||
005 | 20151218 | ||
007 | cr|uuu---uuuuu | ||
008 | 150806s2014 |||| o||u| ||||||eng d | ||
020 | |a 0580829103 |c Online |9 0-580-82910-3 | ||
020 | |a 9780580829109 |9 978-0-580-82910-9 | ||
035 | |a (OCoLC)899271307 | ||
035 | |a (DE-599)BVBBV042742361 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 | ||
082 | 0 | |a 658.478 |2 23 | |
100 | 1 | |a Kenyon, Bridget |e Verfasser |4 aut | |
245 | 1 | 0 | |a Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 |c Bridget Kenyon and Edward (Ted) Humphreys |
246 | 1 | 3 | |a Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 second edition |
250 | |a Fourth edition | ||
264 | 1 | |a London |b BSI |c 2014 | |
300 | |a 1 Online-Ressource (viii, 131 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Information security management systems guidance series | |
500 | |a "ISO/IEC 27001:2013"--Foreword. - Previous edition: 2005 | ||
505 | 8 | |a This book provides guidance on the implementation of ISMS (Information Security Management Systems) control requirements for auditing existing control implementations in order to help organizations preparing for certification in accordance with requirements specified in the new ISO/IEC 27001:2013 Information security management system (ISMS) - Requirements. It includes the definitive requirements that auditors must address when certifying organizations to the 2nd edition of ISO/IEC 27001:2013 and provides guidance on the implementation, checking and auditing of the controls. The guide discusses each of the controls of the standard from two different viewpoints: Implementation - This describes what to consider in order to fulfil the control requirements when implementing the controls from the standard. This guidance is aligned with the standard, which gives advice on the implementation of the controls. Auditing - This focuses on what to check when examining the implementation of the standard controls to ensure that the implementation covers the essential ISMS control requirements. Get the information you need to be fully updated in line with the revised standard and includes new references and definitions. It is applicable to organizations of any size, government departments and agencies, certification and accreditation bodies, training organizations, academic institutions, implementers, auditors, consultants, trainers and lecturers | |
650 | 7 | |a BUSINESS & ECONOMICS / Industrial Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Management Science |2 bisacsh | |
650 | 7 | |a BUSINESS & ECONOMICS / Organizational Behavior |2 bisacsh | |
650 | 4 | |a Unternehmen | |
650 | 4 | |a Wirtschaft | |
650 | 4 | |a Business enterprises |x Computer networks |x Security measures |x Auditing | |
650 | 4 | |a Computer security |x Management |x Standards | |
650 | 4 | |a Data protection |x Management |x Standards | |
650 | 4 | |a Confidential business information | |
650 | 4 | |a Risk management |x Evaluation | |
650 | 4 | |a Risk assessment | |
700 | 1 | |a Humphreys, Edward |e Verfasser |4 aut | |
710 | 2 | |a British Standards Institution |e Sonstige |0 (DE-588)1004482-6 |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=690162 |x Aggregator |3 Volltext |
912 | |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028173229 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=690162 |l TUM01 |p ZDB-4-NLEBK |q TUM_PDA_EBSCOBAE_gekauft |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804174956136759296 |
---|---|
any_adam_object | |
author | Kenyon, Bridget Humphreys, Edward |
author_facet | Kenyon, Bridget Humphreys, Edward |
author_role | aut aut |
author_sort | Kenyon, Bridget |
author_variant | b k bk e h eh |
building | Verbundindex |
bvnumber | BV042742361 |
collection | ZDB-4-NLEBK |
contents | This book provides guidance on the implementation of ISMS (Information Security Management Systems) control requirements for auditing existing control implementations in order to help organizations preparing for certification in accordance with requirements specified in the new ISO/IEC 27001:2013 Information security management system (ISMS) - Requirements. It includes the definitive requirements that auditors must address when certifying organizations to the 2nd edition of ISO/IEC 27001:2013 and provides guidance on the implementation, checking and auditing of the controls. The guide discusses each of the controls of the standard from two different viewpoints: Implementation - This describes what to consider in order to fulfil the control requirements when implementing the controls from the standard. This guidance is aligned with the standard, which gives advice on the implementation of the controls. Auditing - This focuses on what to check when examining the implementation of the standard controls to ensure that the implementation covers the essential ISMS control requirements. Get the information you need to be fully updated in line with the revised standard and includes new references and definitions. It is applicable to organizations of any size, government departments and agencies, certification and accreditation bodies, training organizations, academic institutions, implementers, auditors, consultants, trainers and lecturers |
ctrlnum | (OCoLC)899271307 (DE-599)BVBBV042742361 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
edition | Fourth edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03738nmm a2200541zc 4500</leader><controlfield tag="001">BV042742361</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20151218 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150806s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0580829103</subfield><subfield code="c">Online</subfield><subfield code="9">0-580-82910-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780580829109</subfield><subfield code="9">978-0-580-82910-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)899271307</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042742361</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kenyon, Bridget</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001</subfield><subfield code="c">Bridget Kenyon and Edward (Ted) Humphreys</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 second edition</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">BSI</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 131 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security management systems guidance series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"ISO/IEC 27001:2013"--Foreword. - Previous edition: 2005</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This book provides guidance on the implementation of ISMS (Information Security Management Systems) control requirements for auditing existing control implementations in order to help organizations preparing for certification in accordance with requirements specified in the new ISO/IEC 27001:2013 Information security management system (ISMS) - Requirements. It includes the definitive requirements that auditors must address when certifying organizations to the 2nd edition of ISO/IEC 27001:2013 and provides guidance on the implementation, checking and auditing of the controls. The guide discusses each of the controls of the standard from two different viewpoints: Implementation - This describes what to consider in order to fulfil the control requirements when implementing the controls from the standard. This guidance is aligned with the standard, which gives advice on the implementation of the controls. Auditing - This focuses on what to check when examining the implementation of the standard controls to ensure that the implementation covers the essential ISMS control requirements. Get the information you need to be fully updated in line with the revised standard and includes new references and definitions. It is applicable to organizations of any size, government departments and agencies, certification and accreditation bodies, training organizations, academic institutions, implementers, auditors, consultants, trainers and lecturers</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Industrial Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Management Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">BUSINESS & ECONOMICS / Organizational Behavior</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Unternehmen</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Wirtschaft</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Auditing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Management</subfield><subfield code="x">Standards</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential business information</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk management</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Risk assessment</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Humphreys, Edward</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">British Standards Institution</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1004482-6</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=690162</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028173229</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=690162</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">TUM_PDA_EBSCOBAE_gekauft</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042742361 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:08:37Z |
institution | BVB |
institution_GND | (DE-588)1004482-6 |
isbn | 0580829103 9780580829109 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028173229 |
oclc_num | 899271307 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (viii, 131 Seiten) |
psigel | ZDB-4-NLEBK ZDB-4-NLEBK TUM_PDA_EBSCOBAE_gekauft |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | BSI |
record_format | marc |
series2 | Information security management systems guidance series |
spelling | Kenyon, Bridget Verfasser aut Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Bridget Kenyon and Edward (Ted) Humphreys Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 second edition Fourth edition London BSI 2014 1 Online-Ressource (viii, 131 Seiten) txt rdacontent c rdamedia cr rdacarrier Information security management systems guidance series "ISO/IEC 27001:2013"--Foreword. - Previous edition: 2005 This book provides guidance on the implementation of ISMS (Information Security Management Systems) control requirements for auditing existing control implementations in order to help organizations preparing for certification in accordance with requirements specified in the new ISO/IEC 27001:2013 Information security management system (ISMS) - Requirements. It includes the definitive requirements that auditors must address when certifying organizations to the 2nd edition of ISO/IEC 27001:2013 and provides guidance on the implementation, checking and auditing of the controls. The guide discusses each of the controls of the standard from two different viewpoints: Implementation - This describes what to consider in order to fulfil the control requirements when implementing the controls from the standard. This guidance is aligned with the standard, which gives advice on the implementation of the controls. Auditing - This focuses on what to check when examining the implementation of the standard controls to ensure that the implementation covers the essential ISMS control requirements. Get the information you need to be fully updated in line with the revised standard and includes new references and definitions. It is applicable to organizations of any size, government departments and agencies, certification and accreditation bodies, training organizations, academic institutions, implementers, auditors, consultants, trainers and lecturers BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Unternehmen Wirtschaft Business enterprises Computer networks Security measures Auditing Computer security Management Standards Data protection Management Standards Confidential business information Risk management Evaluation Risk assessment Humphreys, Edward Verfasser aut British Standards Institution Sonstige (DE-588)1004482-6 oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=690162 Aggregator Volltext |
spellingShingle | Kenyon, Bridget Humphreys, Edward Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 This book provides guidance on the implementation of ISMS (Information Security Management Systems) control requirements for auditing existing control implementations in order to help organizations preparing for certification in accordance with requirements specified in the new ISO/IEC 27001:2013 Information security management system (ISMS) - Requirements. It includes the definitive requirements that auditors must address when certifying organizations to the 2nd edition of ISO/IEC 27001:2013 and provides guidance on the implementation, checking and auditing of the controls. The guide discusses each of the controls of the standard from two different viewpoints: Implementation - This describes what to consider in order to fulfil the control requirements when implementing the controls from the standard. This guidance is aligned with the standard, which gives advice on the implementation of the controls. Auditing - This focuses on what to check when examining the implementation of the standard controls to ensure that the implementation covers the essential ISMS control requirements. Get the information you need to be fully updated in line with the revised standard and includes new references and definitions. It is applicable to organizations of any size, government departments and agencies, certification and accreditation bodies, training organizations, academic institutions, implementers, auditors, consultants, trainers and lecturers BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Unternehmen Wirtschaft Business enterprises Computer networks Security measures Auditing Computer security Management Standards Data protection Management Standards Confidential business information Risk management Evaluation Risk assessment |
title | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 |
title_alt | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 second edition |
title_auth | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 |
title_exact_search | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 |
title_full | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Bridget Kenyon and Edward (Ted) Humphreys |
title_fullStr | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Bridget Kenyon and Edward (Ted) Humphreys |
title_full_unstemmed | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 Bridget Kenyon and Edward (Ted) Humphreys |
title_short | Guide to the implementation and auditing of ISMS controls based on ISO/IEC 27001 |
title_sort | guide to the implementation and auditing of isms controls based on iso iec 27001 |
topic | BUSINESS & ECONOMICS / Industrial Management bisacsh BUSINESS & ECONOMICS / Management bisacsh BUSINESS & ECONOMICS / Management Science bisacsh BUSINESS & ECONOMICS / Organizational Behavior bisacsh Unternehmen Wirtschaft Business enterprises Computer networks Security measures Auditing Computer security Management Standards Data protection Management Standards Confidential business information Risk management Evaluation Risk assessment |
topic_facet | BUSINESS & ECONOMICS / Industrial Management BUSINESS & ECONOMICS / Management BUSINESS & ECONOMICS / Management Science BUSINESS & ECONOMICS / Organizational Behavior Unternehmen Wirtschaft Business enterprises Computer networks Security measures Auditing Computer security Management Standards Data protection Management Standards Confidential business information Risk management Evaluation Risk assessment |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=690162 |
work_keys_str_mv | AT kenyonbridget guidetotheimplementationandauditingofismscontrolsbasedonisoiec27001 AT humphreysedward guidetotheimplementationandauditingofismscontrolsbasedonisoiec27001 AT britishstandardsinstitution guidetotheimplementationandauditingofismscontrolsbasedonisoiec27001 AT kenyonbridget guidetotheimplementationandauditingofismscontrolsbasedonisoiec27001secondedition AT humphreysedward guidetotheimplementationandauditingofismscontrolsbasedonisoiec27001secondedition AT britishstandardsinstitution guidetotheimplementationandauditingofismscontrolsbasedonisoiec27001secondedition |