Krausz, Michael, 1942-

Information Security Breaches : Avoidance and Treatment based on ISO27001. - Ely : IT Governance Pub., 2009. - 1 online resource (56 pages) - JSTOR eBooks .

Includes bibliographical references.

INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.

This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.

9781849280280 1849280282

CL0500000077 Safari Books Online 22573/ctt4k5q45 JSTOR

Business enterprises--Computer networks--Security measures.
Computer security--Management--Standards.
Data protection--Management--Standards.

QA76.9.A25 / K728 2009