Loading…

Information Security Breaches : Avoidance and Treatment based on ISO27001.

This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for th...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Main Author: Krausz, Michael
Format: Electronic eBook
Language:Inglés
Published: Ely : IT Governance Pub., 2009.
Subjects:
Online Access:Texto completo
Table of Contents:
  • INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.