Cargando…

How to survive a data breach : a pocket guide /

This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with security experts, lawyers and softw...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mitchell, Stewart
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, U.K. : IT Governance Pub., ©2009.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 JSTOR_ocn679603868
003 OCoLC
005 20231005004200.0
006 m o d
007 cr cnu---unuuu
008 101108s2009 enk o 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d CEF  |d OCLCQ  |d E7B  |d DEBSZ  |d N$T  |d OCLCQ  |d B24X7  |d OCLCF  |d JSTOR  |d OCLCQ  |d AGLDB  |d LIV  |d OCLCQ  |d IOG  |d VTS  |d COO  |d LVT  |d STF  |d UAB  |d M8D  |d UKAHL  |d CNCEN  |d RDF  |d UX1  |d OCLCO  |d OCLCQ 
019 |a 1175621715 
020 |a 9781905356973  |q (electronic bk.) 
020 |a 1905356978  |q (electronic bk.) 
020 |z 9781905356966  |q (Paper) 
020 |z 190535696X  |q (Paper) 
029 1 |a DEBBG  |b BV043044692 
029 1 |a DEBSZ  |b 355450798 
029 1 |a DEBSZ  |b 421529202 
029 1 |a HEBIS  |b 291520677 
029 1 |a AU@  |b 000054176564 
035 |a (OCoLC)679603868  |z (OCoLC)1175621715 
037 |a 22573/ctt4k57mn  |b JSTOR 
050 4 |a QA76.9.D314  |b M58 2009 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Mitchell, Stewart. 
245 1 0 |a How to survive a data breach :  |b a pocket guide /  |c Stewart Mitchell. 
260 |a Ely, U.K. :  |b IT Governance Pub.,  |c ©2009. 
300 |a 1 online resource (44 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a This handy pocket guide tells you what you need to do to prepare for a data breach. It explains the key measures you need to take to handle the situation and to minimise the damage. The information is drawn from various regulatory publications, and interviews with security experts, lawyers and software suppliers. 
505 0 |a INTRODUCTION; CHAPTER 1: ASSESSMENT AND CONTAINMENT; Hit the ground running; The penny drops; Dissecting the data; Severity assessment; Let the response fit the crime; Gathering evidence; CHAPTER 2: NOTIFICATION; The disclosure conundrum; Data notification and UK law; Data notification and US law; Who to inform; Notification infrastructure; Public relations considerations; CHAPTER 3: WINNING HEARTS AND MINDS; Formulating a media strategy; Keeping customers onside; CHAPTER 4: POST-BREACH REVIEW; Learning from mistakes; Red alert for IT; Forming a data breach recovery plan 
505 8 |a Planning privacy into the systemEnforce policy; APPENDIX 
504 |a Includes bibliographical references. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Data protection. 
650 0 |a Database security. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Bases de données  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Database security.  |2 fast  |0 (OCoLC)fst00888063 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh753  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26079668 
938 |a Books 24x7  |b B247  |n bks00056011 
938 |a ebrary  |b EBRY  |n ebr10496556 
938 |a EBSCOhost  |b EBSC  |n 391130 
994 |a 92  |b IZTAP