Implementing an information security management system: security management based on ISO 27001 guidelines
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[New York]
Apress
[2020]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xvii, 274 Seiten Illustrationen |
ISBN: | 9781484254127 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046627675 | ||
003 | DE-604 | ||
005 | 20200528 | ||
007 | t | ||
008 | 200313s2020 a||| |||| 00||| eng d | ||
020 | |a 9781484254127 |9 978-1-4842-5412-7 | ||
035 | |a (OCoLC)1164606040 | ||
035 | |a (DE-599)BVBBV046627675 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Chopra, Abhishek |e Verfasser |0 (DE-588)1202938981 |4 aut | |
245 | 1 | 0 | |a Implementing an information security management system |b security management based on ISO 27001 guidelines |c Abhishek Chopra ; Mukund Chaudhary |
264 | 1 | |a [New York] |b Apress |c [2020] | |
300 | |a xvii, 274 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Security | |
650 | 4 | |a Enterprise Architecture | |
650 | 4 | |a Information Storage and Retrieval | |
650 | 4 | |a Data protection | |
650 | 4 | |a Management information systems | |
650 | 4 | |a Information storage and retrieval | |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Chaudhary, Mukund |e Verfasser |0 (DE-588)1202939104 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4842-5413-4 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032039274&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032039274 |
Datensatz im Suchindex
_version_ | 1804181311498223616 |
---|---|
adam_text | Table of Contents About the Authors................................................................................................................ xi About the Technical Reviewer............................ xiii Acknowledgments......................... ,.xv Introduction................................ xvii Chapter 1: The Need for Information Security................................................................. 1 What Is Information Security?............................................................................................................1 Data............................................................................. 2 Information....................................................................................................................................2 How ISO 27001 Applies to You............................... 4 ISO 27001: Information Security Management System..............................................................4 Why Is It Important to Safeguard Information?.................................................................................9 Yahoo............................................................................................................................................. 9 Marriott International.................................................................................................................... 9 eBay............................................................................................................................................. 10 Heartland Payment
Systems......................................................................................................10 Uber............................................................................................................................................. 10 NHS Cyberattack...............................................................................................................................11 Safeguarding Summary.......................................................... 11 Scenario 1: Banking......................................................................................... 12 Scenario 2: Trade Secrets........................................................................................................... 14 Scenario 3: Healthcare............................................................................................................... 15 Scenario 4: Manufacturing......................................................................................................... 18 Scenario 5: Information Technology.......................................................................................... 19 Summary......... .......................................................... 20 v
TABLE OF CONTENTS Chapter 2: Assessing Needs and Scope......... ................................................................ 21 Assessing Business Needs................................... 21 Scope and High-level Timeframe for Implementation.........................................................................24 What’s Covered in the Scope Document?....................................................................................... 27 What Is the Statement of Applicability (SOA)?............................................................................... 28 High-Level Timeframe....................................................................................................................... 46 Senior Management Support........................................................................ 47 Summary................................... 48 Reference........................ 48 Chapter 3: Project Kick-Off......................... 49 Presenting a High-Level Plan..................................................................................................................50 Setting Up the Project Taskforce............................................................................................................ 52 Administration Department.............................................................................................................. 52 Chief Information Security Officer (CISO)....................................................................................... 52 System Admin or IT
Manager............................................................................ 53 Information Security Management (ISM) Team............................................................................. 54 Human Resources Management............................................................. 54 Getting Commitment................................................................................................................................ 55 Summary....................................................................................................................................... Chapter 4: Initial Risk Assessment.......................... 58 59 Meeting the Team.....................................................................................................................................59 Annex 5: Information Security Policies............................................................................................60 Annex 6: Organization of Information Security.............................................................................. 61 Annex 7: Human Resources Security...............................................................................................61 Annex 8: Asset Management............................................................................................................ 62 Annex 9: Access Control.................................................................................................................... 63 Annex 10: Cryptographic
Control......................................................................................................63 Annex 11: Physical and Environmental Security........................................................................... 64 Annex 12: Operations Security......................................................................................................... 66 Annex 13: Communications Security..................................................................... vi 67
TABLE OF CONTENTS Annex 14: Security Requirements of Information Systems.........................................................68 Annex 15: Supplier Relationships.................................................................................................... 71 Annex 16: Information Security Incident Management............................................................... 71 Annex 17: Information Security Aspects of Business Continuity Management........................72 Annex 18: Compliance.......................................................................................................................72 Preparing the Analysis Report..................................................... 73 Presenting the Report to Management/Teams.....................................................................................75 Summary................................................................................................................................................... 76 Chapter 5: Risk Management Approach.........................................................................77 Defining and Finalizing the Risk Assessment Framework.................................................................77 Risk Components................................................................................................................................78 What Are Threats?............................................................................................................................. 79 What Are
Vulnerabilities?...................................................................................................................79 What Is a Security Risk?....................................................................................................................80 What Is a Risk Ranking?......................................................................... 82 Risk Prioritization.................. 82 Risk Owner Identification................................................................................................................. 83 Risk Treatment.................................................................................................................................... 83 What Is Acceptable Risk?................................................................................................... 86 Risk Monitoring and Review....... ......................................................................................................87 Identifying Assets..................................................................................................................................... 87 Asset Value..........................................................................................................................................88 Asset Classification........................................................................................................................... 89 Asset Labeling.................................................. 90 Asset
Register......................................................................................................... 92 Asset Disposal.................................................................................................................................... 94 Asset Register Examples...................................................................................................................95 Managing Risks........................................................................................................................................98 Identifying Security Controls.................................................................................................................100 Revisiting the Statement of Applicability (SoA)..................................................................................101 Summary.................................................................................................................................................. 101 vii
TABLE OF CONTENTS Chapter 6: Execution............................................................................................... Information Security Awareness......................... 103 103 An Emphasis on Training Content.................................................................................................. 104 Awareness Quiz................................................................................................................................ 104 Policies and Procedures............................................... 105 Who Defines the Policies?.............................................................................................................. 105 Who Reviews and Approves the Policies?.................................................................................... 106 Which Policies and Procedures Are Covered?............................................................................. 106 Understanding and Implementing Controls........................................................................................ 121 A.5 Information Security Policies.................................................................................................. 121 A.6 Organization of Information Security...................................................................................... 123 A. 7 Human Resources Security...................................................................................................... 130 A.8 Asset Management............................................... 137 A.9 Access
Control........................................................................................................... 1 A.10 Cryptography............................................................................................................................ 155 A.11 Physical and Environmental Security................................................................................. 158 A.12 Operations Security.......................................................................................................... A.13 Communication Security...................................................................................................... 166 181 A.14 System Acquisition, Development, and Maintenance........................................................ 188 A.15 Supplier Relationships........................................................................................................... 197 A.16 Information Security Incident Management........................................................................204 A. 17 Information Security Aspects of Business Continuity Management................................210 A.18 Compliance............................................................................................................................... 213 Summary.................................................................................. References............................................................................................................................................... 219 Chapter 7: Internal
Audit................................................................................................. 221 Preparing an Internal Audit Team......................................................................................................... 221 Conducting Audits...................................................................................................................................224 Audit Plan...........................................................................................................................................224 Pre-Audit Meeting/Briefing..............................................................................................................226 Opening Meeting.............................................................................................................................. 227 viii
TABLE OF CONTENTS Audit’s Finding Report........................................................................................... 230 Closing the Findings and Gaps.............................................................................................................232 Planning Improvement.......................................................................................................................... 232 Eliminating Gaps.............................................................................................................................. 233 Can You Eliminate All Gaps?.......................................................................................................... 234 Communicating............................................................................. 234 Summary................................................................................................................................................. 235 Chapter 8: Management Review....................................................................................237 Conducting the Review.................. 237 What Is Expected from Department Heads/Stakeholders?........................................................238 Scheduling the Management Review Meeting............................................................................238 Items To Be Covered in the Presentation................. 240 Conducting the Review Meeting................... ............................................................................... 241 Plan
Improvement.................................................................................................................................. 244 What Do You Improve?.......................................................... 244 How Do You Know if You Have Improved?....................................................................................244 Communicate........................ 245 Summary..................................................................................................................................................245 Chapter 9: External Audit................................................................................................247 Audit Preparation................................................................................................................................... 247 Stage 1 Audit.................................................................................................................................... 248 Stage 2 Audit.................................................................................................................................... 248 Stage 3 Audit.................................................................................................................................... 249 Best Practices................................................................................................................ 251 Audit Closure........................ 253 Audit
Report............................................................................................................................................ 254 Executive Summary......................................................................................................................... 254 SWOT Analysis.................................................................................................................................. 256 Scope Description Control by Control............................................................................................256 Finding Summary.............................................................................................................................257 ix
TABLE OF CONTENTS Evidence Summary................................................................... 257 Lead Auditor Recommendation...................... 257 FrontPage......................................................................................................................................... 257 Summary.................................................................................................................................................. 258 Chapter 10: Continual Improvement............................................................................ 259 Areas of Improvement............................................................................................................................260 Monthly KPIs/Reports.......... ..................................................................... 260 Employee Observations............................. 260 Periodic Internal Audits...................................................................................................................261 Management Review Meetings..................................................................................................... 261 Customers/Clients............................................................................................................................261 New Tools/Technology............................................................................... Regulatory/Governmental Laws.................................. 262 Execution
Plan........................................................................................................................................ 262 Pilot the Improvement First......................................................................................................... 263 Measure Success.............................................................................................................................263 Performing Regular Audits/Reviews................................ 264 Summary.................................................................................................................................................. 265 Index....................................................................................................................................267 x
|
adam_txt |
Table of Contents About the Authors. xi About the Technical Reviewer. xiii Acknowledgments. ,.xv Introduction. xvii Chapter 1: The Need for Information Security. 1 What Is Information Security?.1 Data. 2 Information.2 How ISO 27001 Applies to You. 4 ISO 27001: Information Security Management System.4 Why Is It Important to Safeguard Information?.9 Yahoo. 9 Marriott International. 9 eBay. 10 Heartland Payment
Systems.10 Uber. 10 NHS Cyberattack.11 Safeguarding Summary. 11 Scenario 1: Banking. 12 Scenario 2: Trade Secrets. 14 Scenario 3: Healthcare. 15 Scenario 4: Manufacturing. 18 Scenario 5: Information Technology. 19 Summary. . 20 v
TABLE OF CONTENTS Chapter 2: Assessing Needs and Scope. . 21 Assessing Business Needs. 21 Scope and High-level Timeframe for Implementation.24 What’s Covered in the Scope Document?. 27 What Is the Statement of Applicability (SOA)?. 28 High-Level Timeframe. 46 Senior Management Support. 47 Summary. 48 Reference. 48 Chapter 3: Project Kick-Off. 49 Presenting a High-Level Plan.50 Setting Up the Project Taskforce. 52 Administration Department. 52 Chief Information Security Officer (CISO). 52 System Admin or IT
Manager. 53 Information Security Management (ISM) Team. 54 Human Resources Management. 54 Getting Commitment. 55 Summary. Chapter 4: Initial Risk Assessment. 58 59 Meeting the Team.59 Annex 5: Information Security Policies.60 Annex 6: Organization of Information Security. 61 Annex 7: Human Resources Security.61 Annex 8: Asset Management. 62 Annex 9: Access Control. 63 Annex 10: Cryptographic
Control.63 Annex 11: Physical and Environmental Security. 64 Annex 12: Operations Security. 66 Annex 13: Communications Security. vi 67
TABLE OF CONTENTS Annex 14: Security Requirements of Information Systems.68 Annex 15: Supplier Relationships. 71 Annex 16: Information Security Incident Management. 71 Annex 17: Information Security Aspects of Business Continuity Management.72 Annex 18: Compliance.72 Preparing the Analysis Report. 73 Presenting the Report to Management/Teams.75 Summary. 76 Chapter 5: Risk Management Approach.77 Defining and Finalizing the Risk Assessment Framework.77 Risk Components.78 What Are Threats?. 79 What Are
Vulnerabilities?.79 What Is a Security Risk?.80 What Is a Risk Ranking?. 82 Risk Prioritization. 82 Risk Owner Identification. 83 Risk Treatment. 83 What Is Acceptable Risk?. 86 Risk Monitoring and Review. .87 Identifying Assets. 87 Asset Value.88 Asset Classification. 89 Asset Labeling. 90 Asset
Register. 92 Asset Disposal. 94 Asset Register Examples.95 Managing Risks.98 Identifying Security Controls.100 Revisiting the Statement of Applicability (SoA).101 Summary. 101 vii
TABLE OF CONTENTS Chapter 6: Execution. Information Security Awareness. 103 103 An Emphasis on Training Content. 104 Awareness Quiz. 104 Policies and Procedures. 105 Who Defines the Policies?. 105 Who Reviews and Approves the Policies?. 106 Which Policies and Procedures Are Covered?. 106 Understanding and Implementing Controls. 121 A.5 Information Security Policies. 121 A.6 Organization of Information Security. 123 A. 7 Human Resources Security. 130 A.8 Asset Management. 137 A.9 Access
Control. 1 A.10 Cryptography. 155 A.11 Physical and Environmental Security. 158 A.12 Operations Security. A.13 Communication Security. 166 181 A.14 System Acquisition, Development, and Maintenance. 188 A.15 Supplier Relationships. 197 A.16 Information Security Incident Management.204 A. 17 Information Security Aspects of Business Continuity Management.210 A.18 Compliance. 213 Summary. References. 219 Chapter 7: Internal
Audit. 221 Preparing an Internal Audit Team. 221 Conducting Audits.224 Audit Plan.224 Pre-Audit Meeting/Briefing.226 Opening Meeting. 227 viii
TABLE OF CONTENTS Audit’s Finding Report. 230 Closing the Findings and Gaps.232 Planning Improvement. 232 Eliminating Gaps. 233 Can You Eliminate All Gaps?. 234 Communicating. 234 Summary. 235 Chapter 8: Management Review.237 Conducting the Review. 237 What Is Expected from Department Heads/Stakeholders?.238 Scheduling the Management Review Meeting.238 Items To Be Covered in the Presentation. 240 Conducting the Review Meeting. . 241 Plan
Improvement. 244 What Do You Improve?. 244 How Do You Know if You Have Improved?.244 Communicate. 245 Summary.245 Chapter 9: External Audit.247 Audit Preparation. 247 Stage 1 Audit. 248 Stage 2 Audit. 248 Stage 3 Audit. 249 Best Practices. 251 Audit Closure. 253 Audit
Report. 254 Executive Summary. 254 SWOT Analysis. 256 Scope Description Control by Control.256 Finding Summary.257 ix
TABLE OF CONTENTS Evidence Summary. 257 Lead Auditor Recommendation. 257 FrontPage. 257 Summary. 258 Chapter 10: Continual Improvement. 259 Areas of Improvement.260 Monthly KPIs/Reports. . 260 Employee Observations. 260 Periodic Internal Audits.261 Management Review Meetings. 261 Customers/Clients.261 New Tools/Technology. Regulatory/Governmental Laws. 262 Execution
Plan. 262 Pilot the Improvement First. 263 Measure Success.263 Performing Regular Audits/Reviews. 264 Summary. 265 Index.267 x |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Chopra, Abhishek Chaudhary, Mukund |
author_GND | (DE-588)1202938981 (DE-588)1202939104 |
author_facet | Chopra, Abhishek Chaudhary, Mukund |
author_role | aut aut |
author_sort | Chopra, Abhishek |
author_variant | a c ac m c mc |
building | Verbundindex |
bvnumber | BV046627675 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1164606040 (DE-599)BVBBV046627675 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01826nam a2200445zc 4500</leader><controlfield tag="001">BV046627675</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200528 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">200313s2020 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484254127</subfield><subfield code="9">978-1-4842-5412-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1164606040</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046627675</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Chopra, Abhishek</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202938981</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Implementing an information security management system</subfield><subfield code="b">security management based on ISO 27001 guidelines</subfield><subfield code="c">Abhishek Chopra ; Mukund Chaudhary</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[New York]</subfield><subfield code="b">Apress</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 274 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Enterprise Architecture</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information Storage and Retrieval</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Management information systems</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information storage and retrieval</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Chaudhary, Mukund</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1202939104</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-5413-4</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032039274&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032039274</subfield></datafield></record></collection> |
id | DE-604.BV046627675 |
illustrated | Illustrated |
index_date | 2024-07-03T14:09:52Z |
indexdate | 2024-07-10T08:49:38Z |
institution | BVB |
isbn | 9781484254127 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032039274 |
oclc_num | 1164606040 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | xvii, 274 Seiten Illustrationen |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Apress |
record_format | marc |
spelling | Chopra, Abhishek Verfasser (DE-588)1202938981 aut Implementing an information security management system security management based on ISO 27001 guidelines Abhishek Chopra ; Mukund Chaudhary [New York] Apress [2020] xvii, 274 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz (DE-588)4011134-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datenschutz (DE-588)4011134-9 s Computersicherheit (DE-588)4274324-2 s DE-604 Chaudhary, Mukund Verfasser (DE-588)1202939104 aut Erscheint auch als Online-Ausgabe 978-1-4842-5413-4 Digitalisierung UB Regensburg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032039274&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Chopra, Abhishek Chaudhary, Mukund Implementing an information security management system security management based on ISO 27001 guidelines Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011134-9 (DE-588)4274324-2 |
title | Implementing an information security management system security management based on ISO 27001 guidelines |
title_auth | Implementing an information security management system security management based on ISO 27001 guidelines |
title_exact_search | Implementing an information security management system security management based on ISO 27001 guidelines |
title_exact_search_txtP | Implementing an information security management system security management based on ISO 27001 guidelines |
title_full | Implementing an information security management system security management based on ISO 27001 guidelines Abhishek Chopra ; Mukund Chaudhary |
title_fullStr | Implementing an information security management system security management based on ISO 27001 guidelines Abhishek Chopra ; Mukund Chaudhary |
title_full_unstemmed | Implementing an information security management system security management based on ISO 27001 guidelines Abhishek Chopra ; Mukund Chaudhary |
title_short | Implementing an information security management system |
title_sort | implementing an information security management system security management based on iso 27001 guidelines |
title_sub | security management based on ISO 27001 guidelines |
topic | Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz (DE-588)4011134-9 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Security Enterprise Architecture Information Storage and Retrieval Data protection Management information systems Information storage and retrieval Datenschutz Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032039274&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT chopraabhishek implementinganinformationsecuritymanagementsystemsecuritymanagementbasedoniso27001guidelines AT chaudharymukund implementinganinformationsecuritymanagementsystemsecuritymanagementbasedoniso27001guidelines |