Cargando…

Information protection playbook /

The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and net...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Kane, Greg (Editor ), Koppel, Lorna (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Kidlington, Oxford : Elsevier, 2013.
Colección:Security Executive Council risk management portfolio.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 SCIDIR_ocn859676314
003 OCoLC
005 20231117044922.0
006 m o d
007 cr cnu---unuuu
008 131009s2013 enk ob 000 0 eng d
040 |a OPELS  |b eng  |e rda  |e pn  |c OPELS  |d IDEBK  |d YDXCP  |d UPM  |d N$T  |d GGVRL  |d COO  |d OCLCF  |d UIU  |d OCLCQ  |d EBLCP  |d DEBSZ  |d FEM  |d MERUC  |d OCLCQ  |d OCLCA  |d U3W  |d D6H  |d OCLCQ  |d WYU  |d AUD  |d DCT  |d OCLCQ  |d SNU  |d UK7LJ  |d REDDC  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 862830163  |a 968087416  |a 969066949  |a 1156167767  |a 1162106351  |a 1229063972  |a 1229132516  |a 1232033823  |a 1257364492  |a 1258550269 
020 |a 9780124172425  |q (electronic bk.) 
020 |a 0124172423  |q (electronic bk.) 
020 |z 9780124172326 
020 |z 0124172326 
035 |a (OCoLC)859676314  |z (OCoLC)862830163  |z (OCoLC)968087416  |z (OCoLC)969066949  |z (OCoLC)1156167767  |z (OCoLC)1162106351  |z (OCoLC)1229063972  |z (OCoLC)1229132516  |z (OCoLC)1232033823  |z (OCoLC)1257364492  |z (OCoLC)1258550269 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Information protection playbook /  |c edited by Greg Kane, Lorna Koppel. 
264 1 |a Kidlington, Oxford :  |b Elsevier,  |c 2013. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a Security Executive Council risk management portfolio 
520 |a The primary goal of the Information Protection Playbook is to serve as a comprehensive resource for information protection (IP) professionals who must provide adequate information security at a reasonable cost. It emphasizes a holistic view of IP: one that protects the applications, systems, and networks that deliver business information from failures of confidentiality, integrity, availability, trust and accountability, and privacy. Using the guidelines provided in the Information Protection Playbook, security and information technology (IT) managers will learn how to implement the five functions of an IP framework: governance, program planning, risk management, incident response management, and program administration. These functions are based on a model promoted by the Information Systems Audit and Control Association (ISACA) and validated by thousands of Certified Information Security Managers. The five functions are further broken down into a series of objectives or milestones to be achieved in order to implement an IP framework. The extensive appendices included at the end of the book make for an excellent resource for the security or IT manager building an IP program from the ground up. They include, for example, a board of directors presentation complete with sample slides; an IP policy document checklist; a risk prioritization procedure matrix, which illustrates how to classify a threat based on a scale of high, medium, and low; a facility management self-assessment questionnaire; and a list of representative job descriptions for roles in IP. Emphasizes information protection guidelines that are driven by business objectives, laws, regulations, and industry standardsDraws from successful practices in global organizations, benchmarking, advice from a variety of subject-matter experts, and feedback from the organizations involved with the Security Executive CouncilIncludes 11 appendices full of the sample checklists, matrices, and forms that are discussed in the book. 
504 |a Includes bibliographical references. 
505 0 |a Chapter 1. Information protection function one : governance -- chapter 2. Information protection function two : program planning -- chapter 3. Information protection function three : risk management -- chapter 4. Information protection function four : incident response management -- chapter 5. Information protection function five : program administration. 
546 |a English. 
650 0 |a Data protection. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 2 |a Computer Security  |0 (DNLM)D016494 
650 6 |a Protection de l'information (Informatique)  |0 (CaQQLa)201-0061151 
650 6 |a R�eseaux d'ordinateurs  |x S�ecurit�e  |x Mesures.  |0 (CaQQLa)201-0263812 
650 6 |a S�ecurit�e informatique.  |0 (CaQQLa)201-0061152 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data protection  |2 fast  |0 (OCoLC)fst00887958 
700 1 |a Kane, Greg,  |e editor. 
700 1 |a Koppel, Lorna,  |e editor. 
776 0 8 |i Print version:  |a Kane, Greg.  |t Information Protection Playbook.  |d Burlington : Elsevier Science, �2013  |z 9780124172326 
830 0 |a Security Executive Council risk management portfolio. 
856 4 0 |u https://sciencedirect.uam.elogim.com/science/book/9780124172326  |z Texto completo