Information Security Breaches: Avoidance and Treatment based on ISO27001
Saved in:
Bibliographic Details
Main Author: Krausz, Michael (Author)
Format: Electronic eBook
Language:English
Published: Ely IT Governance Pub. 2009
Subjects:
Online Access:Volltext
Item Description:INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.
This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction
Includes bibliographical references
Physical Description:1 Online-Ressource (56 pages)
ISBN:9781849280280
1849280282
1849280274
9781849280273
1282529064
9781282529069

There is no print copy available.

Interlibrary loan Place Request Caution: Not in THWS collection! Get full text