Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Information Security Management with ITIL(R) V3 (eBook)

eBook Download: PDF
2010
144 Seiten
van Haren Publishing (Verlag)
978-90-8753-553-7 (ISBN)

Lese- und Medienproben

Information Security Management with ITIL(R) V3 -  Jacques A. Cazemier
Systemvoraussetzungen
47,54 inkl. MwSt
(CHF 46,45)
Der eBook-Verkauf erfolgt durch die Lehmanns Media GmbH (Berlin) zum Preis in Euro inkl. MwSt.
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers: Fundamentals of information security – providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors. Fundamentals of management of information security - explains what information security management is about and its objectives. Details are also given on implementing the process and the continuous effort required to maintain its quality. ITIL V3 and Information Security Management - shows the links with the other ITIL processes. Shows how integrating the Information Security Management activities into existing processes and activities not only supports efficiencies but ultimately is the key way to achieve effective Information Security Management. Implementing Information Security Management - gives practical advice how to put Information Security Management into practice. From awareness in the organization via documentation required to maturity models; this guidance describes best practices for realizing Information Security Management.
This groundbreaking new title looks at Information Security from defining what security measures positively support the business, to implementation to maintaining the required level and anticipating required changes. It covers:Fundamentals of information security - providing readers insight and give background about what is going to be managed. Topics covered include: types of security controls, business benefits and the perspectives of business, customers, partners, service providers, and auditors.Fundamentals of management of information security - explains what information security management is about and its objectives. Details are also given on implementing the process and the continuous effort required to maintain its quality.ITIL V3 and Information Security Management - shows the links with the other ITIL processes. Shows how integrating the Information Security Management activities into existing processes and activities not only supports efficiencies but ultimately is the key way to achieve effective Information Security Management. Implementing Information Security Management - gives practical advice how to put Information Security Management into practice. From awareness in the organization via documentation required to maturity models; this guidance describes best practices for realizing Information Security Management.

About the authors 7
Acknowledgements 7
Executive summary 9
1Introduction 12
1.1This book 12
2Fundamentals of information security 20
2.1Perspectives on information security 20
2.2Security architectures 31
3Fundamentals of management of information security 38
3.1Information Security Management – the continuous effort 39
3.2Information Security Management as a PDCA cycle 39
4ITIL version 3 and information security 48
4.1Service Strategy 52
4.2Service Design 65
4.3Service Transition 70
4.4Continual Service Improvement 79
4.5Service Operation 88
4.6Brief reflection on ITIL v3 101
5Guidelines for implementing Information Security Management 102
5.1Implementing or improving ITIL Information Security Management 102
5.2Awareness 105
5.3Organization of Information Security Management 107
5.4Documentation 113
5.5Natural growth path through maturity levels 115
5.6Pitfalls and success factors 124
5.7Partnerships and outsourcing 125
Annex A: Information Security Management and standardization 128
A.1 ISO/IEC 27000 series 127
A.2 ISO/IEC 13335:2004 – Management of information andcommunications technology security 129
A.3 ISO 7498-2 – OSI Security Architecture 129
A.4 ISO/IEC 20000:2005 – Service Management 131
A.5 ISF: The standard of Good Practice for InformationSecurity 133
A.6 SABSA 133
A.7 COBIT 135
A.8 PCI/DSS 137
A.9 Information Security Management and certification 139
Annex B: Cross-references for ISO/IEC 27002 and ITIL Information Security Management 140
Annex C: Literature and links 142

Erscheint lt. Verlag 8.1.2010
Reihe/Serie Best Practice
Verlagsort Zaltbommel
Sprache englisch
Themenwelt Informatik Weitere Themen Zertifizierung
Sozialwissenschaften Pädagogik
ISBN-10 90-8753-553-8 / 9087535538
ISBN-13 978-90-8753-553-7 / 9789087535537
Haben Sie eine Frage zum Produkt?
PDFPDF (Adobe DRM)
Größe: 2,1 MB

Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine Adobe-ID und die Software Adobe Digital Editions (kostenlos). Von der Benutzung der OverDrive Media Console raten wir Ihnen ab. Erfahrungsgemäß treten hier gehäuft Probleme mit dem Adobe DRM auf.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine Adobe-ID sowie eine kostenlose App.
Geräteliste und zusätzliche Hinweise

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich