Cargando…

Information security breaches : avoidance treatment based on ISO27001 /

This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, thi...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Krausz, Michael
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, UK : IT Governance Press, ©2014.
Edición:2nd ed.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 JSTOR_ocn888035953
003 OCoLC
005 20231005004200.0
006 m o d
007 cr unu||||||||
008 140820s2014 enka ob 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d EBLCP  |d B24X7  |d STF  |d COO  |d DEBSZ  |d DEBBG  |d JSTOR  |d YDXCP  |d OCLCF  |d OCLCQ  |d N$T  |d OCLCQ  |d ICA  |d AGLDB  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d VTS  |d CEF  |d OCLCQ  |d LVT  |d AU@  |d OCLCQ  |d K6U  |d UKAHL  |d RDF  |d SNU  |d VLY  |d BRF  |d EYM  |d QGK  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 966372826  |a 1060197336  |a 1100957411  |a 1162439283  |a 1179662446  |a 1194741139  |a 1241771245 
020 |a 9781849285841  |q (electronic bk.) 
020 |a 1849285845  |q (electronic bk.) 
020 |z 1849285837 
020 |z 9781849285834 
029 1 |a AU@  |b 000068861047 
029 1 |a DEBBG  |b BV042182351 
029 1 |a DEBSZ  |b 415542952 
029 1 |a DEBSZ  |b 417230303 
029 1 |a DEBSZ  |b 481284583 
029 1 |a GBVCP  |b 819912875 
035 |a (OCoLC)888035953  |z (OCoLC)966372826  |z (OCoLC)1060197336  |z (OCoLC)1100957411  |z (OCoLC)1162439283  |z (OCoLC)1179662446  |z (OCoLC)1194741139  |z (OCoLC)1241771245 
037 |a CL0500000466  |b Safari Books Online 
037 |a 22573/ctt7z4pbd  |b JSTOR 
050 4 |a QA76.9.A25 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Krausz, Michael. 
245 1 0 |a Information security breaches :  |b avoidance treatment based on ISO27001 /  |c Michael Krausz. 
250 |a 2nd ed. 
260 |a Ely, Cambridgeshire, UK :  |b IT Governance Press,  |c ©2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a Online resource; title from title page (Safari, viewed August 9, 2014). 
520 |a This book helps you to manage a security breach by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive. When your organisation's security is compromised, you cannot afford to waste time deciding how to resolve the issue. Updated to cover ISO27001:2013, this second edition gives you clear guidance on how to treat an information security breach and tells you the plans and procedures you have to put in place to minimise damage and return to business as usual. A recovery plan will help you to: recover, and resume normal operations, more quickly; preserve customer confidence by quickly resolving service disruption; secure evidence to help with any criminal investigation and improve your chances of catching those responsible. Read this guide and find out how to manage in the face of a data breach. --  |c Edited summary from book. 
504 |a Includes bibliographical references. 
505 0 |a Cover; Title; Copyright; Contents; Introduction; Chapter 1: What constitutes a breach?; Chapter 2: Treatment using ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; Chapter 3: Case studies; Case study 1 -- small company; Case study 2 -- small company; Case study 3 -- medium-sized company; Case study 4 -- large company; ITG Resources 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Piratage informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Hacking  |2 fast 
776 0 |z 1849285837 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt7zsxnr  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH28339360 
938 |a Books 24x7  |b B247  |n bks00069070 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL1778763 
938 |a EBSCOhost  |b EBSC  |n 838731 
938 |a YBP Library Services  |b YANK  |n 12023457 
994 |a 92  |b IZTAP