Information Security Breaches
Avoidance and Treatment Based on ISO27001
Seiten
2014
|
2nd Revised edition
IT Governance Publishing (Verlag)
978-1-84928-583-4 (ISBN)
IT Governance Publishing (Verlag)
978-1-84928-583-4 (ISBN)
Uses real-life information security incidents to explain how to reduce the risks of information security breaches and, crucially, what to do when they occur. Now updated to cover ISO27001:2013
What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance and treatment based on ISO27001:2013 helps you to manage this threat by detailing what to do as soon as you discover a breach. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and decisive action. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual.A recovery plan will help you to: resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible.Read this guide and find out how to manage in the face of a data breach.
What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions. Information Security Breaches - Avoidance and treatment based on ISO27001:2013 helps you to manage this threat by detailing what to do as soon as you discover a breach. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and decisive action. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual.A recovery plan will help you to: resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible.Read this guide and find out how to manage in the face of a data breach.
Michael Krausz is an IT expert and experienced professional investigator. He has investigated over a hundred cases of information security breaches. Many of these cases have concerned forms of white-collar crime. Michael Krausz studied physics, computer science and law at the University of Technology in Vienna, and at Vienna and Webster universities. He has delivered over 5000 hours of professional and academic training and has provided services in eleven countries to date.
Introduction; Chapter 1:What constitutes a breach?; Chapter 2:Treatment using ISO27001; Chapter 3:Case studies; ITG Resources
Erscheint lt. Verlag | 27.5.2014 |
---|---|
Verlagsort | Ely |
Sprache | englisch |
Maße | 95 x 165 mm |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Recht / Steuern ► Privatrecht / Bürgerliches Recht ► IT-Recht | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 1-84928-583-7 / 1849285837 |
ISBN-13 | 978-1-84928-583-4 / 9781849285834 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
Mehr entdecken
aus dem Bereich
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …
Buch | Softcover (2022)
Springer Vieweg (Verlag)
CHF 48,95
Management der Informationssicherheit und Vorbereitung auf die …
Buch (2024)
Carl Hanser (Verlag)
CHF 97,95