GDPR and cyber security for business information systems /:
This book is designed to present specific and practical information on the key areas of compliance with the GDPR relevant to business information systems in a global context. Key areas covered include: principles and rights within the GDPR, information security, data protection by design and default...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Denmark :
River Publishers,
[2018]
|
Schriftenreihe: | River Publishers series in security and digital forensics.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book is designed to present specific and practical information on the key areas of compliance with the GDPR relevant to business information systems in a global context. Key areas covered include: principles and rights within the GDPR, information security, data protection by design and default, policies and procedures, encryption methods, incident response and management, data breaches. |
Beschreibung: | 1 online resource (xviii, 264 pages) : color illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9788793609136 8793609132 8793609124 9788793609129 8770220794 9788770220798 9781003338253 1003338259 9781000799347 1000799344 9781000799484 1000799484 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1062396762 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 181112t20182018dk a ob 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d YDX |d OCLCF |d EBLCP |d UKAHL |d OCLCQ |d OCL |d OCLCO |d OCLCQ |d OCLCO |d K6U |d OCL |d OCLCQ |d TYFRS |d OCLCO | ||
019 | |a 1066037184 |a 1088205724 | ||
020 | |a 9788793609136 |q (Hardback) | ||
020 | |a 8793609132 |q (Hardback) | ||
020 | |a 8793609124 |q (Ebook) | ||
020 | |a 9788793609129 |q (Ebook) | ||
020 | |a 8770220794 |q (electronic bk.) | ||
020 | |a 9788770220798 |q (electronic bk.) | ||
020 | |a 9781003338253 |q (electronic bk.) | ||
020 | |a 1003338259 |q (electronic bk.) | ||
020 | |a 9781000799347 |q (electronic bk. : PDF) | ||
020 | |a 1000799344 |q (electronic bk. : PDF) | ||
020 | |a 9781000799484 |q (electronic bk. : EPUB) | ||
020 | |a 1000799484 |q (electronic bk. : EPUB) | ||
024 | 7 | |a 10.1201/9781003338253 |2 doi | |
035 | |a (OCoLC)1062396762 |z (OCoLC)1066037184 |z (OCoLC)1088205724 | ||
037 | |a 9781003338253 |b Taylor & Francis | ||
043 | |a e------ | ||
050 | 4 | |a KJE6071.A432016 |b G63 2018 | |
072 | 7 | |a LAW |x 068000 |2 bisacsh | |
072 | 7 | |a SCI |x 024000 |2 bisacsh | |
072 | 7 | |a UR |2 bicssc | |
082 | 7 | |a 343.240999 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Gobeo, Antoni, |e author. |0 http://id.loc.gov/authorities/names/no2018152682 | |
245 | 1 | 0 | |a GDPR and cyber security for business information systems / |c Antoni Gobeo, Connor Fowler, William J. Buchanan. |
264 | 1 | |a Denmark : |b River Publishers, |c [2018] | |
264 | 4 | |c ©2018 | |
300 | |a 1 online resource (xviii, 264 pages) : |b color illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers series in security and digital forensics | |
504 | |a Includes bibliographical references and index. | ||
520 | |a This book is designed to present specific and practical information on the key areas of compliance with the GDPR relevant to business information systems in a global context. Key areas covered include: principles and rights within the GDPR, information security, data protection by design and default, policies and procedures, encryption methods, incident response and management, data breaches. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Preface; Acknowledgements; List of Figures; List of Abbreviations; Part One: Introduction; Chapter 1: The GDPR Fundamentals; A Brief History of Data Collection and Data Protection; The GDPR; To Whom Does It Apply?; Who Is Exempt?; Personal Data: Why it's Worth Protecting; The Privacy Argument; The Economic Argument; Consequences to Individuals of Data Misuse; The Heart of the GDPR; The Six Principles; The Six Lawful Bases; The Rights of Natural Persons in the GDPR | |
505 | 8 | |a The Three ExceptionsChapter Review; References; Appendix; Chapter 2: Organisations, Institutions, and Roles; Introduction; Quis Custodiet Ipsos Custodes?; European Union; Duties of the EDPB; Supervisory Authorities; The ICO in Action; Organisations Under the GDPR; Public Authorities; Types of Public Authorities; NGO's and Charities; NGO's and Charities as Data Controllers; Institutions and Agencies; Court of Justice of the European Union; European Union Agency for Network and Information Security: ENISA; The United Kingdom; Government Communications Headquarters | |
505 | 8 | |a The National Cyber Security CentreThe GCHQ Bude: GCHQ Composite Signals Organisation Morwenstow; Investigatory Powers Commissioner's Office; Investigatory Powers Tribunal; Chapter Review; References; Appendix; Chapter 3: Information Systems Management and the GDPR; Introduction; Information Systems in Organisations; Processes and Essential Systems; Types of Information Systems; Information Management; What is IM; Stakeholders; Data Management through the Ages; Functions of Information Management; Information Systems Theory; Data Flow Mapping; Data Flow Mapping Techniques | |
505 | 8 | |a Data Controller and Data ProcessorData Controller; Data Processor; Distinguishing the Difference Between the Data Controller and the Data Processor; Chapter Review; References; Chapter 4: CyberSecurity and the GDPR; Introduction; Cyber Security as a Function of Compliance; Privacy; Protection; Process; Cyber Attacks; Malware; Social Engineering; Phishing; Countermeasures; Encryption; Chapter Review; References; Part Two: Preparatory Steps; Chapter 5: Data Protection by Design and Default; Introduction; Data Protection is a Program; not a Project; What is Privacy? | |
505 | 8 | |a Privacy and Protection by Design and DefaultThe Security Principle: Appropriate Technical and Organisational Measures; Organisational: A Corporate Culture of Data Protection; Staff Awareness of Security; Organisational Responsibility for Security; Technical Measures; Physical Security; Hardware Security; Computer Security: Design; Computer Security: Measures; Open Web Application Security Project (OWASP); Assessing Information Assets: Value and Risk; Information Classification and Labelling; Special Category Data: Sensitive and Very Sensitive Personal Data; Criminal Offence Data | |
545 | 0 | |a Antoni Gobeo, Connor Fowler, William J. Buchanan | |
650 | 0 | |a Data protection |x Law and legislation |z European Union countries. | |
650 | 0 | |a Cyberspace |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh2021002499 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Database security. |0 http://id.loc.gov/authorities/subjects/sh90005677 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Bases de données |x Sécurité |x Mesures. | |
650 | 7 | |a LAW |x Military. |2 bisacsh | |
650 | 7 | |a SCIENCE / Energy |2 bisacsh | |
650 | 7 | |a Cyberspace |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |x Law and legislation |2 fast | |
650 | 7 | |a Database security |2 fast | |
651 | 7 | |a European Union countries |2 fast | |
700 | 1 | |a Fowler, Connor, |e author. |0 http://id.loc.gov/authorities/names/no2018152319 | |
700 | 1 | |a Buchanan, William, |e author. |0 http://id.loc.gov/authorities/names/nr95040642 | |
776 | 0 | 8 | |i Print version: |a Gobeo, Antoni. |t GDPR and cyber security for business information systems. |d Denmark : River Publishers, [2018] |z 9788793609136 |w (OCoLC)1029796346 |
830 | 0 | |a River Publishers series in security and digital forensics. |0 http://id.loc.gov/authorities/names/no2019075335 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1874788 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH40583900 | ||
938 | |a YBP Library Services |b YANK |n 18126435 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH35946334 | ||
938 | |a EBSCOhost |b EBSC |n 1874788 | ||
938 | |a YBP Library Services |b YANK |n 16065773 | ||
938 | |a YBP Library Services |b YANK |n 18105924 | ||
938 | |a YBP Library Services |b YANK |n 14943651 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1062396762 |
---|---|
_version_ | 1816882476754141185 |
adam_text | |
any_adam_object | |
author | Gobeo, Antoni Fowler, Connor Buchanan, William |
author_GND | http://id.loc.gov/authorities/names/no2018152682 http://id.loc.gov/authorities/names/no2018152319 http://id.loc.gov/authorities/names/nr95040642 |
author_facet | Gobeo, Antoni Fowler, Connor Buchanan, William |
author_role | aut aut aut |
author_sort | Gobeo, Antoni |
author_variant | a g ag c f cf w b wb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | K - Law |
callnumber-label | KJE6071 |
callnumber-raw | KJE6071.A432016 G63 2018 |
callnumber-search | KJE6071.A432016 G63 2018 |
callnumber-sort | KJE 46071 A432016 G63 42018 |
collection | ZDB-4-EBA |
contents | Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Preface; Acknowledgements; List of Figures; List of Abbreviations; Part One: Introduction; Chapter 1: The GDPR Fundamentals; A Brief History of Data Collection and Data Protection; The GDPR; To Whom Does It Apply?; Who Is Exempt?; Personal Data: Why it's Worth Protecting; The Privacy Argument; The Economic Argument; Consequences to Individuals of Data Misuse; The Heart of the GDPR; The Six Principles; The Six Lawful Bases; The Rights of Natural Persons in the GDPR The Three ExceptionsChapter Review; References; Appendix; Chapter 2: Organisations, Institutions, and Roles; Introduction; Quis Custodiet Ipsos Custodes?; European Union; Duties of the EDPB; Supervisory Authorities; The ICO in Action; Organisations Under the GDPR; Public Authorities; Types of Public Authorities; NGO's and Charities; NGO's and Charities as Data Controllers; Institutions and Agencies; Court of Justice of the European Union; European Union Agency for Network and Information Security: ENISA; The United Kingdom; Government Communications Headquarters The National Cyber Security CentreThe GCHQ Bude: GCHQ Composite Signals Organisation Morwenstow; Investigatory Powers Commissioner's Office; Investigatory Powers Tribunal; Chapter Review; References; Appendix; Chapter 3: Information Systems Management and the GDPR; Introduction; Information Systems in Organisations; Processes and Essential Systems; Types of Information Systems; Information Management; What is IM; Stakeholders; Data Management through the Ages; Functions of Information Management; Information Systems Theory; Data Flow Mapping; Data Flow Mapping Techniques Data Controller and Data ProcessorData Controller; Data Processor; Distinguishing the Difference Between the Data Controller and the Data Processor; Chapter Review; References; Chapter 4: CyberSecurity and the GDPR; Introduction; Cyber Security as a Function of Compliance; Privacy; Protection; Process; Cyber Attacks; Malware; Social Engineering; Phishing; Countermeasures; Encryption; Chapter Review; References; Part Two: Preparatory Steps; Chapter 5: Data Protection by Design and Default; Introduction; Data Protection is a Program; not a Project; What is Privacy? Privacy and Protection by Design and DefaultThe Security Principle: Appropriate Technical and Organisational Measures; Organisational: A Corporate Culture of Data Protection; Staff Awareness of Security; Organisational Responsibility for Security; Technical Measures; Physical Security; Hardware Security; Computer Security: Design; Computer Security: Measures; Open Web Application Security Project (OWASP); Assessing Information Assets: Value and Risk; Information Classification and Labelling; Special Category Data: Sensitive and Very Sensitive Personal Data; Criminal Offence Data |
ctrlnum | (OCoLC)1062396762 |
dewey-full | 343.240999 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 343 - Military, tax, trade & industrial law |
dewey-raw | 343.240999 |
dewey-search | 343.240999 |
dewey-sort | 3343.240999 |
dewey-tens | 340 - Law |
discipline | Rechtswissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07208cam a2200913 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1062396762</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">181112t20182018dk a ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCF</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UKAHL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TYFRS</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1066037184</subfield><subfield code="a">1088205724</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788793609136</subfield><subfield code="q">(Hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8793609132</subfield><subfield code="q">(Hardback)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8793609124</subfield><subfield code="q">(Ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788793609129</subfield><subfield code="q">(Ebook)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8770220794</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770220798</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003338253</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003338259</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000799347</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000799344</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000799484</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000799484</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003338253</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1062396762</subfield><subfield code="z">(OCoLC)1066037184</subfield><subfield code="z">(OCoLC)1088205724</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781003338253</subfield><subfield code="b">Taylor & Francis</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e------</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">KJE6071.A432016</subfield><subfield code="b">G63 2018</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">068000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SCI</subfield><subfield code="x">024000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">343.240999</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gobeo, Antoni,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2018152682</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">GDPR and cyber security for business information systems /</subfield><subfield code="c">Antoni Gobeo, Connor Fowler, William J. Buchanan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Denmark :</subfield><subfield code="b">River Publishers,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xviii, 264 pages) :</subfield><subfield code="b">color illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">River Publishers series in security and digital forensics</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is designed to present specific and practical information on the key areas of compliance with the GDPR relevant to business information systems in a global context. Key areas covered include: principles and rights within the GDPR, information security, data protection by design and default, policies and procedures, encryption methods, incident response and management, data breaches.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Preface; Acknowledgements; List of Figures; List of Abbreviations; Part One: Introduction; Chapter 1: The GDPR Fundamentals; A Brief History of Data Collection and Data Protection; The GDPR; To Whom Does It Apply?; Who Is Exempt?; Personal Data: Why it's Worth Protecting; The Privacy Argument; The Economic Argument; Consequences to Individuals of Data Misuse; The Heart of the GDPR; The Six Principles; The Six Lawful Bases; The Rights of Natural Persons in the GDPR</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Three ExceptionsChapter Review; References; Appendix; Chapter 2: Organisations, Institutions, and Roles; Introduction; Quis Custodiet Ipsos Custodes?; European Union; Duties of the EDPB; Supervisory Authorities; The ICO in Action; Organisations Under the GDPR; Public Authorities; Types of Public Authorities; NGO's and Charities; NGO's and Charities as Data Controllers; Institutions and Agencies; Court of Justice of the European Union; European Union Agency for Network and Information Security: ENISA; The United Kingdom; Government Communications Headquarters</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The National Cyber Security CentreThe GCHQ Bude: GCHQ Composite Signals Organisation Morwenstow; Investigatory Powers Commissioner's Office; Investigatory Powers Tribunal; Chapter Review; References; Appendix; Chapter 3: Information Systems Management and the GDPR; Introduction; Information Systems in Organisations; Processes and Essential Systems; Types of Information Systems; Information Management; What is IM; Stakeholders; Data Management through the Ages; Functions of Information Management; Information Systems Theory; Data Flow Mapping; Data Flow Mapping Techniques</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Data Controller and Data ProcessorData Controller; Data Processor; Distinguishing the Difference Between the Data Controller and the Data Processor; Chapter Review; References; Chapter 4: CyberSecurity and the GDPR; Introduction; Cyber Security as a Function of Compliance; Privacy; Protection; Process; Cyber Attacks; Malware; Social Engineering; Phishing; Countermeasures; Encryption; Chapter Review; References; Part Two: Preparatory Steps; Chapter 5: Data Protection by Design and Default; Introduction; Data Protection is a Program; not a Project; What is Privacy?</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Privacy and Protection by Design and DefaultThe Security Principle: Appropriate Technical and Organisational Measures; Organisational: A Corporate Culture of Data Protection; Staff Awareness of Security; Organisational Responsibility for Security; Technical Measures; Physical Security; Hardware Security; Computer Security: Design; Computer Security: Measures; Open Web Application Security Project (OWASP); Assessing Information Assets: Value and Risk; Information Classification and Labelling; Special Category Data: Sensitive and Very Sensitive Personal Data; Criminal Offence Data</subfield></datafield><datafield tag="545" ind1="0" ind2=" "><subfield code="a">Antoni Gobeo, Connor Fowler, William J. Buchanan</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="z">European Union countries.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2021002499</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Database security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90005677</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Bases de données</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">LAW</subfield><subfield code="x">Military.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SCIENCE / Energy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="x">Law and legislation</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Database security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">European Union countries</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fowler, Connor,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2018152319</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Buchanan, William,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nr95040642</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Gobeo, Antoni.</subfield><subfield code="t">GDPR and cyber security for business information systems.</subfield><subfield code="d">Denmark : River Publishers, [2018]</subfield><subfield code="z">9788793609136</subfield><subfield code="w">(OCoLC)1029796346</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">River Publishers series in security and digital forensics.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2019075335</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1874788</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH40583900</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">18126435</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH35946334</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1874788</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">16065773</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">18105924</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">14943651</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
geographic | European Union countries fast |
geographic_facet | European Union countries |
id | ZDB-4-EBA-on1062396762 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:29:13Z |
institution | BVB |
isbn | 9788793609136 8793609132 8793609124 9788793609129 8770220794 9788770220798 9781003338253 1003338259 9781000799347 1000799344 9781000799484 1000799484 |
language | English |
oclc_num | 1062396762 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xviii, 264 pages) : color illustrations |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | River Publishers, |
record_format | marc |
series | River Publishers series in security and digital forensics. |
series2 | River Publishers series in security and digital forensics |
spelling | Gobeo, Antoni, author. http://id.loc.gov/authorities/names/no2018152682 GDPR and cyber security for business information systems / Antoni Gobeo, Connor Fowler, William J. Buchanan. Denmark : River Publishers, [2018] ©2018 1 online resource (xviii, 264 pages) : color illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier River Publishers series in security and digital forensics Includes bibliographical references and index. This book is designed to present specific and practical information on the key areas of compliance with the GDPR relevant to business information systems in a global context. Key areas covered include: principles and rights within the GDPR, information security, data protection by design and default, policies and procedures, encryption methods, incident response and management, data breaches. Print version record. Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Preface; Acknowledgements; List of Figures; List of Abbreviations; Part One: Introduction; Chapter 1: The GDPR Fundamentals; A Brief History of Data Collection and Data Protection; The GDPR; To Whom Does It Apply?; Who Is Exempt?; Personal Data: Why it's Worth Protecting; The Privacy Argument; The Economic Argument; Consequences to Individuals of Data Misuse; The Heart of the GDPR; The Six Principles; The Six Lawful Bases; The Rights of Natural Persons in the GDPR The Three ExceptionsChapter Review; References; Appendix; Chapter 2: Organisations, Institutions, and Roles; Introduction; Quis Custodiet Ipsos Custodes?; European Union; Duties of the EDPB; Supervisory Authorities; The ICO in Action; Organisations Under the GDPR; Public Authorities; Types of Public Authorities; NGO's and Charities; NGO's and Charities as Data Controllers; Institutions and Agencies; Court of Justice of the European Union; European Union Agency for Network and Information Security: ENISA; The United Kingdom; Government Communications Headquarters The National Cyber Security CentreThe GCHQ Bude: GCHQ Composite Signals Organisation Morwenstow; Investigatory Powers Commissioner's Office; Investigatory Powers Tribunal; Chapter Review; References; Appendix; Chapter 3: Information Systems Management and the GDPR; Introduction; Information Systems in Organisations; Processes and Essential Systems; Types of Information Systems; Information Management; What is IM; Stakeholders; Data Management through the Ages; Functions of Information Management; Information Systems Theory; Data Flow Mapping; Data Flow Mapping Techniques Data Controller and Data ProcessorData Controller; Data Processor; Distinguishing the Difference Between the Data Controller and the Data Processor; Chapter Review; References; Chapter 4: CyberSecurity and the GDPR; Introduction; Cyber Security as a Function of Compliance; Privacy; Protection; Process; Cyber Attacks; Malware; Social Engineering; Phishing; Countermeasures; Encryption; Chapter Review; References; Part Two: Preparatory Steps; Chapter 5: Data Protection by Design and Default; Introduction; Data Protection is a Program; not a Project; What is Privacy? Privacy and Protection by Design and DefaultThe Security Principle: Appropriate Technical and Organisational Measures; Organisational: A Corporate Culture of Data Protection; Staff Awareness of Security; Organisational Responsibility for Security; Technical Measures; Physical Security; Hardware Security; Computer Security: Design; Computer Security: Measures; Open Web Application Security Project (OWASP); Assessing Information Assets: Value and Risk; Information Classification and Labelling; Special Category Data: Sensitive and Very Sensitive Personal Data; Criminal Offence Data Antoni Gobeo, Connor Fowler, William J. Buchanan Data protection Law and legislation European Union countries. Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Database security. http://id.loc.gov/authorities/subjects/sh90005677 Sécurité informatique. Bases de données Sécurité Mesures. LAW Military. bisacsh SCIENCE / Energy bisacsh Cyberspace Security measures fast Computer security fast Data protection Law and legislation fast Database security fast European Union countries fast Fowler, Connor, author. http://id.loc.gov/authorities/names/no2018152319 Buchanan, William, author. http://id.loc.gov/authorities/names/nr95040642 Print version: Gobeo, Antoni. GDPR and cyber security for business information systems. Denmark : River Publishers, [2018] 9788793609136 (OCoLC)1029796346 River Publishers series in security and digital forensics. http://id.loc.gov/authorities/names/no2019075335 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1874788 Volltext |
spellingShingle | Gobeo, Antoni Fowler, Connor Buchanan, William GDPR and cyber security for business information systems / River Publishers series in security and digital forensics. Front Cover; Half Title Page; RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS; Title Page; Copyright Page; Contents; Preface; Acknowledgements; List of Figures; List of Abbreviations; Part One: Introduction; Chapter 1: The GDPR Fundamentals; A Brief History of Data Collection and Data Protection; The GDPR; To Whom Does It Apply?; Who Is Exempt?; Personal Data: Why it's Worth Protecting; The Privacy Argument; The Economic Argument; Consequences to Individuals of Data Misuse; The Heart of the GDPR; The Six Principles; The Six Lawful Bases; The Rights of Natural Persons in the GDPR The Three ExceptionsChapter Review; References; Appendix; Chapter 2: Organisations, Institutions, and Roles; Introduction; Quis Custodiet Ipsos Custodes?; European Union; Duties of the EDPB; Supervisory Authorities; The ICO in Action; Organisations Under the GDPR; Public Authorities; Types of Public Authorities; NGO's and Charities; NGO's and Charities as Data Controllers; Institutions and Agencies; Court of Justice of the European Union; European Union Agency for Network and Information Security: ENISA; The United Kingdom; Government Communications Headquarters The National Cyber Security CentreThe GCHQ Bude: GCHQ Composite Signals Organisation Morwenstow; Investigatory Powers Commissioner's Office; Investigatory Powers Tribunal; Chapter Review; References; Appendix; Chapter 3: Information Systems Management and the GDPR; Introduction; Information Systems in Organisations; Processes and Essential Systems; Types of Information Systems; Information Management; What is IM; Stakeholders; Data Management through the Ages; Functions of Information Management; Information Systems Theory; Data Flow Mapping; Data Flow Mapping Techniques Data Controller and Data ProcessorData Controller; Data Processor; Distinguishing the Difference Between the Data Controller and the Data Processor; Chapter Review; References; Chapter 4: CyberSecurity and the GDPR; Introduction; Cyber Security as a Function of Compliance; Privacy; Protection; Process; Cyber Attacks; Malware; Social Engineering; Phishing; Countermeasures; Encryption; Chapter Review; References; Part Two: Preparatory Steps; Chapter 5: Data Protection by Design and Default; Introduction; Data Protection is a Program; not a Project; What is Privacy? Privacy and Protection by Design and DefaultThe Security Principle: Appropriate Technical and Organisational Measures; Organisational: A Corporate Culture of Data Protection; Staff Awareness of Security; Organisational Responsibility for Security; Technical Measures; Physical Security; Hardware Security; Computer Security: Design; Computer Security: Measures; Open Web Application Security Project (OWASP); Assessing Information Assets: Value and Risk; Information Classification and Labelling; Special Category Data: Sensitive and Very Sensitive Personal Data; Criminal Offence Data Data protection Law and legislation European Union countries. Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Database security. http://id.loc.gov/authorities/subjects/sh90005677 Sécurité informatique. Bases de données Sécurité Mesures. LAW Military. bisacsh SCIENCE / Energy bisacsh Cyberspace Security measures fast Computer security fast Data protection Law and legislation fast Database security fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2021002499 http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh90005677 |
title | GDPR and cyber security for business information systems / |
title_auth | GDPR and cyber security for business information systems / |
title_exact_search | GDPR and cyber security for business information systems / |
title_full | GDPR and cyber security for business information systems / Antoni Gobeo, Connor Fowler, William J. Buchanan. |
title_fullStr | GDPR and cyber security for business information systems / Antoni Gobeo, Connor Fowler, William J. Buchanan. |
title_full_unstemmed | GDPR and cyber security for business information systems / Antoni Gobeo, Connor Fowler, William J. Buchanan. |
title_short | GDPR and cyber security for business information systems / |
title_sort | gdpr and cyber security for business information systems |
topic | Data protection Law and legislation European Union countries. Cyberspace Security measures. http://id.loc.gov/authorities/subjects/sh2021002499 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Database security. http://id.loc.gov/authorities/subjects/sh90005677 Sécurité informatique. Bases de données Sécurité Mesures. LAW Military. bisacsh SCIENCE / Energy bisacsh Cyberspace Security measures fast Computer security fast Data protection Law and legislation fast Database security fast |
topic_facet | Data protection Law and legislation European Union countries. Cyberspace Security measures. Computer security. Database security. Sécurité informatique. Bases de données Sécurité Mesures. LAW Military. SCIENCE / Energy Cyberspace Security measures Computer security Data protection Law and legislation Database security European Union countries |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1874788 |
work_keys_str_mv | AT gobeoantoni gdprandcybersecurityforbusinessinformationsystems AT fowlerconnor gdprandcybersecurityforbusinessinformationsystems AT buchananwilliam gdprandcybersecurityforbusinessinformationsystems |