Data breaches: trends, costs and best practices
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Ely, U.K.
IT Governance Pub.
2008
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Title from home page (viewed Jan. 4, 2011) Includes bibliographical references Cover -- Contents -- LIST OF FIGURES -- LIST OF TABLES -- 1 INTRODUCTION -- 2 KEY RECOMMENDATIONS -- 3 TRENDS IN REPORTED DATA BREACHES -- 4 COSTS OF DATA BREACHES -- 5 DATA PROTECTION LEGISLATION AND REGULATION -- 6 CAUSES OF DATA BREACHES -- 7 RECOMMENDATIONS FOR IMPROVED DATA SECURITY -- APPENDIX A GLOSSARY -- APPENDIX B EXAMPLES OF DATA BREACHES BY CAUSE -- APPENDIX C EXAMPLES OF DATA BREACHES SHOWING CONSEQUENT ORGANISATIONAL COST AND IMPACT -- APPENDIX D STATE LAWS GOVERNING SECURITY BREACH NOTIFICATION -- APPENDIX E EUROPEAN DIRECTIVE ON DATA PROTECTION. Offering authoritative insights and guidance, this report offers information and worldwide trends in corporate data breaches, and identifies best practices for avoiding business, regulatory and brand damage |
Beschreibung: | 1 Online-Ressource (120 pages) |
ISBN: | 1905356536 9781905356539 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043140028 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2008 |||| o||u| ||||||eng d | ||
020 | |a 1905356536 |c electronic bk. |9 1-905356-53-6 | ||
020 | |a 9781905356539 |c electronic bk. |9 978-1-905356-53-9 | ||
035 | |a (OCoLC)667608164 | ||
035 | |a (DE-599)BVBBV043140028 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 22 | |
245 | 1 | 0 | |a Data breaches |b trends, costs and best practices |c IT Governance Research Team |
264 | 1 | |a Ely, U.K. |b IT Governance Pub. |c 2008 | |
300 | |a 1 Online-Ressource (120 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Title from home page (viewed Jan. 4, 2011) | ||
500 | |a Includes bibliographical references | ||
500 | |a Cover -- Contents -- LIST OF FIGURES -- LIST OF TABLES -- 1 INTRODUCTION -- 2 KEY RECOMMENDATIONS -- 3 TRENDS IN REPORTED DATA BREACHES -- 4 COSTS OF DATA BREACHES -- 5 DATA PROTECTION LEGISLATION AND REGULATION -- 6 CAUSES OF DATA BREACHES -- 7 RECOMMENDATIONS FOR IMPROVED DATA SECURITY -- APPENDIX A GLOSSARY -- APPENDIX B EXAMPLES OF DATA BREACHES BY CAUSE -- APPENDIX C EXAMPLES OF DATA BREACHES SHOWING CONSEQUENT ORGANISATIONAL COST AND IMPACT -- APPENDIX D STATE LAWS GOVERNING SECURITY BREACH NOTIFICATION -- APPENDIX E EUROPEAN DIRECTIVE ON DATA PROTECTION. | ||
500 | |a Offering authoritative insights and guidance, this report offers information and worldwide trends in corporate data breaches, and identifies best practices for avoiding business, regulatory and brand damage | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 4 | |a Recht | |
650 | 4 | |a Computer crimes |x Economic aspects | |
650 | 4 | |a Computer security | |
650 | 4 | |a Data protection |x Law and legislation | |
650 | 4 | |a Data protection | |
710 | 2 | |a IT Governance (Organization) |b Research Team |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028564219 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175588319035392 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV043140028 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)667608164 (DE-599)BVBBV043140028 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02650nmm a2200469zc 4500</leader><controlfield tag="001">BV043140028</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2008 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1905356536</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-905356-53-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781905356539</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-905356-53-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)667608164</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043140028</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Data breaches</subfield><subfield code="b">trends, costs and best practices</subfield><subfield code="c">IT Governance Research Team</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, U.K.</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (120 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from home page (viewed Jan. 4, 2011)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover -- Contents -- LIST OF FIGURES -- LIST OF TABLES -- 1 INTRODUCTION -- 2 KEY RECOMMENDATIONS -- 3 TRENDS IN REPORTED DATA BREACHES -- 4 COSTS OF DATA BREACHES -- 5 DATA PROTECTION LEGISLATION AND REGULATION -- 6 CAUSES OF DATA BREACHES -- 7 RECOMMENDATIONS FOR IMPROVED DATA SECURITY -- APPENDIX A GLOSSARY -- APPENDIX B EXAMPLES OF DATA BREACHES BY CAUSE -- APPENDIX C EXAMPLES OF DATA BREACHES SHOWING CONSEQUENT ORGANISATIONAL COST AND IMPACT -- APPENDIX D STATE LAWS GOVERNING SECURITY BREACH NOTIFICATION -- APPENDIX E EUROPEAN DIRECTIVE ON DATA PROTECTION.</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Offering authoritative insights and guidance, this report offers information and worldwide trends in corporate data breaches, and identifies best practices for avoiding business, regulatory and brand damage</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IT Governance (Organization)</subfield><subfield code="b">Research Team</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028564219</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043140028 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:40Z |
institution | BVB |
isbn | 1905356536 9781905356539 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028564219 |
oclc_num | 667608164 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (120 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Data breaches trends, costs and best practices IT Governance Research Team Ely, U.K. IT Governance Pub. 2008 1 Online-Ressource (120 pages) txt rdacontent c rdamedia cr rdacarrier Title from home page (viewed Jan. 4, 2011) Includes bibliographical references Cover -- Contents -- LIST OF FIGURES -- LIST OF TABLES -- 1 INTRODUCTION -- 2 KEY RECOMMENDATIONS -- 3 TRENDS IN REPORTED DATA BREACHES -- 4 COSTS OF DATA BREACHES -- 5 DATA PROTECTION LEGISLATION AND REGULATION -- 6 CAUSES OF DATA BREACHES -- 7 RECOMMENDATIONS FOR IMPROVED DATA SECURITY -- APPENDIX A GLOSSARY -- APPENDIX B EXAMPLES OF DATA BREACHES BY CAUSE -- APPENDIX C EXAMPLES OF DATA BREACHES SHOWING CONSEQUENT ORGANISATIONAL COST AND IMPACT -- APPENDIX D STATE LAWS GOVERNING SECURITY BREACH NOTIFICATION -- APPENDIX E EUROPEAN DIRECTIVE ON DATA PROTECTION. Offering authoritative insights and guidance, this report offers information and worldwide trends in corporate data breaches, and identifies best practices for avoiding business, regulatory and brand damage COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Recht Computer crimes Economic aspects Computer security Data protection Law and legislation Data protection IT Governance (Organization) Research Team Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648 Aggregator Volltext |
spellingShingle | Data breaches trends, costs and best practices COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Recht Computer crimes Economic aspects Computer security Data protection Law and legislation Data protection |
title | Data breaches trends, costs and best practices |
title_auth | Data breaches trends, costs and best practices |
title_exact_search | Data breaches trends, costs and best practices |
title_full | Data breaches trends, costs and best practices IT Governance Research Team |
title_fullStr | Data breaches trends, costs and best practices IT Governance Research Team |
title_full_unstemmed | Data breaches trends, costs and best practices IT Governance Research Team |
title_short | Data breaches |
title_sort | data breaches trends costs and best practices |
title_sub | trends, costs and best practices |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Recht Computer crimes Economic aspects Computer security Data protection Law and legislation Data protection |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Recht Computer crimes Economic aspects Computer security Data protection Law and legislation Data protection |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438648 |
work_keys_str_mv | AT itgovernanceorganizationresearchteam databreachestrendscostsandbestpractices |