Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Information Security Breaches [electronic resource] : Avoidance and Treatment based on ISO27001.

By: Krausz, Michael, 1942-.
Material type: TextTextPublisher: Ely : IT Governance Pub., 2009Description: 1 online resource (56 p.).ISBN: 9781849280280 (electronic bk.); 1849280282 (electronic bk.); 1282529064; 9781282529069.Subject(s): Business enterprises -- Computer networks -- Security measures | Computer security -- Management -- Standards | Data protection -- Management -- Standards | COMPUTERS -- Internet -- Security | COMPUTERS -- Networking -- Security | COMPUTERS -- Security -- General | Business enterprises / Computer networks / Security measures | Computer security / Management / Standards | Data protection / Management / StandardsGenre/Form: Electronic books. | Electronic books.Additional physical formats: Print version:: No titleDDC classification: 005.8 Online resources: EBSCOhost
Contents:
INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.
Summary: This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.

This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.

Includes bibliographical references.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Information Security Breaches by Krausz, Michael, ©2009
Information Security Breaches by Krausz, Michael, ©2009
Information Security Breaches by Krausz, Michael, ©2009
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter