Cargando…

ISO27001 / ISO27002 : a pocket guide /

Information is one of your organisation's most important resources. Keeping it secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Se...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Calder, Alan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2013.
Edición:2nd edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn860626137
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 131012s2013 enk ob 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d DEBSZ  |d E7B  |d YDXCP  |d B24X7  |d STF  |d JSTOR  |d COO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d CSJ  |d OCLCQ  |d MERUC  |d OCLCQ  |d IOG  |d OCLCF  |d YOU  |d OCLCQ  |d LVT  |d OCLCQ  |d VT2  |d D6H  |d UX1  |d EYM  |d YDXIT  |d OCLCO  |d AU@  |d DST  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 889288828  |a 1060194498  |a 1061313100  |a 1084400564  |a 1175625990  |a 1194720364  |a 1298921243  |a 1303361040 
020 |a 9781849285230  |q (electronic book) 
020 |a 1849285233  |q (electronic book) 
020 |a 9781849285223 
020 |a 1849285225 
020 |a 1849285241 
020 |a 9781849285247 
024 8 |a 9781849285247 
029 1 |a AU@  |b 000053305531 
029 1 |a AU@  |b 000055921699 
029 1 |a AU@  |b 000067106011 
029 1 |a AU@  |b 000070669785 
029 1 |a CHNEW  |b 000638998 
029 1 |a CHVBK  |b 311631932 
029 1 |a DEBBG  |b BV041633532 
029 1 |a DEBSZ  |b 397646526 
035 |a (OCoLC)860626137  |z (OCoLC)889288828  |z (OCoLC)1060194498  |z (OCoLC)1061313100  |z (OCoLC)1084400564  |z (OCoLC)1175625990  |z (OCoLC)1194720364  |z (OCoLC)1298921243  |z (OCoLC)1303361040 
037 |a 22573/ctt4k557f  |b JSTOR 
050 4 |a QA76.9.A25  |b C384 2013 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Calder, Alan,  |e author. 
245 1 0 |a ISO27001 / ISO27002 :  |b a pocket guide /  |c Alan Calder. 
250 |a 2nd edition. 
264 1 |a Ely, Cambridgeshire, United Kingdom :  |b IT Governance Publishing,  |c 2013. 
300 |a 1 online resource (78 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
504 |a Includes bibliographical references. 
505 0 |a Foreword; About the Author; Acknowledgements; contents; Introduction; Risks to information assets; Information Security Management System; Chapter 1: The ISO/IEC 27000 Family of Information Security Standards; ISO/IEC 27001:2013 (ISO27001); ISO/IEC 27002:2013 (ISO27002); ISO/IEC 27003; ISO/IEC 27004; ISO/IEC 27005:2011; ISO/IEC 27006:2011; Definitions; Chapter 2: Background to the Standards; BS7799-2; ISO27001:2005; Correspondence between ISO27001 and ISO27002; Use of the Standards; Chapter 3: Specification vs Code of Practice; Chapter 4: Certification Process; Certification bodies. 
505 8 |a Chapter 5: The ISMS and ISO27001Definition of information security; The ISMS; Chapter 6: Overview of ISO/IEC 27001:2013; Chapter 7: Overview of ISO/IEC 27002:2013; The security categories; Chapter 8: Documentation and Records; Document control requirements; Contents of the ISMS documentation; Annex A document controls; Chapter 9: Management Responsibility; Management direction; Management-related controls; Requirement for management review; Chapter 10: Process Approach and the PDCA Cycle; PDCA and ISO27001; The PDCA cycle and the clauses of ISO27001; Chapter 11: CONTEXT, Policy and Scope. 
505 8 |a The scoping exerciseLegal and regulatory framework; Policy definition; Policy and business objectives; Chapter 12: Risk Assessment; Link to ISO/IEC 27005; Objectives of risk treatment plans; Risk assessment process; Identify risks (6.1.2.c.1); Threats; Vulnerabilities; Identify risk owners (6.1.2.c.2); Assess the consequences of the risk (6.1.2.d.1); Likelihood (6.1.2.d.2); Levels of risk (6.1.2.d.3); Comparing the risk analysis with the risk criteria (6.1.2.e.1); Prioritise the risks (6.1.2.e.2); Risk treatment plan; Chapter 13: The Statement of Applicability (SoA); SoA and external parties. 
505 8 |a Controls and Annex AControls (6.1.3.b); Residual risks; Control objectives; Plan for security incidents; Chapter 14: Implementation; Chapter 15: Check and Act; Monitoring; Auditing; Reviewing; Act -- maintain and improve the ISMS; Chapter 16: Management Review; Chapter 17: ISO27001 Annex A; Annex A control areas and controls; Clause A5: Information security policies; Clause A6: Organisation of information security; Clause A7: Human resource security; Clause A8: Asset management; Clause A9: Access control; Clause A10: Cryptography; ITG Resources. 
520 |a Information is one of your organisation's most important resources. Keeping it secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it. 
542 |f Copyright © Alan Calder  |g 2013 
588 0 |a Description based on online resource; title from PDF title page (viewed January 11, 2021). 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Data protection  |x Standards. 
650 0 |a Data protection  |x Evaluation. 
650 6 |a Protection de l'information (Informatique)  |v Normes. 
650 6 |a Protection de l'information (Informatique)  |x Évaluation. 
650 6 |a Protection de l'information (Informatique)  |x Normes. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Data protection  |x Standards  |2 fast 
758 |i has work:  |a ISO27001/ISO27002 (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGy7R6983WM7WGRkYtRG6q  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Calder, Alan.  |t ISO27001 / ISO27002 : A Pocket Guide.  |d Ely : IT Governance Publishing, ©2013  |z 9781849285223 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1463579  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00058240 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1463579 
938 |a ebrary  |b EBRY  |n ebr10778509 
938 |a YBP Library Services  |b YANK  |n 11230917 
994 |a 92  |b IZTAP