Cargando…

Managing information security breaches : studies from real life /

This book provides a general discussion and education about information security breaches, how they can be treated and what ISO27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. These case studies enable an in-depth analysis of t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Krausz, Michael (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Cambridgeshire, England : IT Governance Publishing, 2014.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • Foreword
  • Preface
  • About the Author
  • Acknowledgements
  • Contents
  • Introduction
  • Part 1 â€? General
  • Chapter 1: Why Risk does Not Depend on Company Size
  • Risk effect
  • Propagation of damage (downstream effects)
  • Culture
  • Information security staff
  • Cash reserves / cash at hand
  • Ability to improvise / make quick decisions
  • Preparedness
  • Contacts with authority
  • Chapter 2: Getting your Risk Profile Right
  • Intuitive risk analysis
  • Formal risk analysis
  • Step 1 â€? Identifying threats
  • Step 2 â€? Assigning damage and likelihoodStep 3 â€? Defining acceptable loss
  • Step 4 â€? Defining mitigation priorities (business priorities)
  • Residual risks
  • Chapter 3: What is a Breach?
  • Confidentiality breach
  • Availability breach
  • Integrity breach
  • Impact
  • Source
  • External vs. internal
  • Unintentional vs. intentional
  • Manual vs. automatic
  • Human vs. nature
  • General treatment options
  • Chapter 4: General Avoidance and Mitigation Strategies
  • Introduction â€? general aspects, avoidance and related ISO27001 controls
  • People
  • A.7.1.1 â€? ScreeningMethods of screening
  • A.7.1.2 â€? Terms and conditions of employment
  • A.7.2.1 â€? Management responsibilities
  • A.7.2.2 â€? Information security awareness, education and training
  • A.7.2.3 â€? Disciplinary process
  • A.7.3.1 â€? Termination or change of employment
  • A.8.1.4 â€? Return of assets
  • A.9.2.6 â€? Removal or adjustment of access rights
  • Processes
  • Technology
  • ISO27001 Controls helpful for treatment of breaches
  • A.6.1.3 â€? Contact with authorities
  • A.7.2.2 â€? Information security awareness, education and trainingA.7.2.3 â€? Disciplinary process A.8.1.4 â€? Return of assets A.9.2.6 â€? Removal or adjustment of access rights
  • A.12.2.1 â€? Controls against malware
  • A.12.4.1 â€? Event logging and
  • A.12.4.2 â€? Protection of log information
  • A.16.1.1 â€? Responsibilities and procedures
  • A.16.1.2 â€? Reporting information security events
  • A.16.1.3 â€? Reporting security weaknesses
  • A.16.1.4 â€? Assessment of and decision on information security events
  • A.16.1.5 â€? Response to information security incidentsA.16.1.6 â€? Learning from information security incidents
  • A.16.1.7 â€? Collection of evidence
  • Strategies and tactics for treating breaches
  • Tactical advice
  • Regular meetings
  • Time, time, time
  • Rest
  • People (number)
  • International contacts
  • Keep the information flowing
  • Keep minutes
  • Additional quality feedback
  • Dimensions of treatment / mitigation of information security breaches
  • None
  • Internal investigation
  • External investigation
  • Joint task force