Cargando…

ISO27001/ISO27002 : Ein Taschenführer /

Information is one of your organization's most important assets, and keeping it secure is vital to your business. This handy pocket guide provides a basic overview of the two main information security standards, with the formal requirements (ISO27001:2013) for creating an Information Security M...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Calder, Alan
Formato: Electrónico eBook
Idioma:Alemán
Inglés
Publicado: Ely : IT Governance Publishing, 2017.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_on1022784816
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |n|---|||||
008 180210s2017 xxk ob 000 0 ger d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d CHVBK  |d OCLCO  |d YDX  |d JSTOR  |d UMI  |d OCLCF  |d OCLCQ  |d OCLCO  |d HTM  |d OCLCQ 
019 |a 994057612  |a 994762158  |a 995450845 
020 |a 9781849289092 
020 |a 1849289093 
020 |z 1849289085 
020 |z 9781849289085 
029 1 |a AU@  |b 000065979055 
029 1 |a CHNEW  |b 000987003 
029 1 |a CHVBK  |b 509399207 
029 1 |a AU@  |b 000070032498 
035 |a (OCoLC)1022784816  |z (OCoLC)994057612  |z (OCoLC)994762158  |z (OCoLC)995450845 
037 |a 22573/ctt1nc4t4g  |b JSTOR 
041 1 |a ger  |h eng 
050 4 |a QA76.9.A25  |b .C353 2017 
072 7 |a COM000000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Calder, Alan. 
245 1 0 |a ISO27001/ISO27002 :  |b Ein Taschenführer /  |c Alan Calder 
260 |a Ely :  |b IT Governance Publishing,  |c 2017. 
300 |a 1 online resource (88 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a Information is one of your organization's most important assets, and keeping it secure is vital to your business. This handy pocket guide provides a basic overview of the two main information security standards, with the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS) and best practice recommendations (ISO27002:2013) for anyone wanting to adopt, implement or have to manage.An ISMS based on the ISO27001/ISO27002 standard offers numerous advantages:Improve your efficiency with information security systems and practices that allow you to focus on your core business Protect your information assets from a range of cyber threats, criminal activities, insider compromises and system failures Systematically manage your risks and create plans to eliminate or mitigate Cyber ​​ThreatsDetect and Remediate Threats or Process Errors SoonerThe Next Step to Certification?You can have an independent audit of your ISMS against the specifications of the ISO27001 standard and, if this confirms the compliance of your ISMS, you may receive an accredited certification. We publish a number of ISMS-related toolkits and books (like "Nine Steps to Success") to help you along the way.ContentsThe ISO/IEC 27000 family of information security standards;Background of the standards;Difference specification - Guidance;Certification process;The ISMS and ISO27001;Overview of ISO/IEC 27001:2013;Overview of ISO/IEC 27002:2013;Documents and records;Management responsibility;Process approach and PDCA Cycle; Context, Policy and Scope; Risk Assessment; The Statement of Applicability; Implementation; Review and Action; Management Review; ISO27001 Annex A; About the AuthorAlan Calder is Founder and Chief Executive Officer of IT Governance Ltd, an information, analytics and consulting firm that helps organizations manage IT governance, risk management, compliance and information security issues. He has many years of experience in senior management in the private and public sector.This handy pocket guide provides a basic overview of the two most important information security standards - buy it today and learn how to protect your organization's most valuable asset. 
504 |a Includes bibliographical references. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Data protection  |x Standards. 
650 6 |a Protection de l'information (Informatique)  |v Normes. 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a Data protection  |x Standards.  |2 fast  |0 (OCoLC)fst00887972 
776 0 8 |i Print version:  |a Calder, Alan.  |t ISO27001/ISO27002: Ein Taschenführer.  |d Ely : IT Governance Publishing, ©2017  |z 9781849289085 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt1pwt917  |z Texto completo 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5255169 
938 |a YBP Library Services  |b YANK  |n 14697847 
994 |a 92  |b IZTAP