Normal view MARC view ISBD view

Information Security Breaches : Avoidance and Treatment based on ISO27001.

By: Krausz, Michael, 1942-.
Material type: TextTextSeries: JSTOR eBooks.Publisher: Ely : IT Governance Pub., 2009Description: 1 online resource (56 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781849280280; 1849280282.Subject(s): Business enterprises -- Computer networks -- Security measures | Computer security -- Management -- Standards | Data protection -- Management -- StandardsAdditional physical formats: Print version:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | K728 2009Online resources: Click here to view this ebook.
Contents:
INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.
Summary: This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
QA76.9.A25 K728 2009 (Browse shelf) https://ezproxy.uttyler.edu/login?url=http://www.jstor.org/stable/10.2307/j.ctt5hh4fm Available ocn609853234

INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.

This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.

Includes bibliographical references.

Print version record.

There are no comments for this item.

Log in to your account to post a comment.