Information Security Breaches : Avoidance and Treatment based on ISO27001.
By: Krausz, Michael.Material type: TextSeries: JSTOR eBooks.Publisher: Ely : IT Governance Pub., 2009Description: 1 online resource (56 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9781849280280; 1849280282.Subject(s): Business enterprises -- Computer networks -- Security measures | Computer security -- Management -- Standards | Data protection -- Management -- StandardsAdditional physical formats: Print version:: No titleDDC classification: 005.8 LOC classification: QA76.9.A25 | K728 2009Online resources: Click here to view this ebook.
|Item type||Current location||Call number||URL||Status||Date due||Barcode|
|Electronic Book||UT Tyler Online Online||QA76.9.A25 K728 2009 (Browse shelf)||https://ezproxy.uttyler.edu/login?url=http://www.jstor.org/stable/10.2307/j.ctt5hh4fm||Available||ocn609853234|
Browsing UT Tyler Online Shelves , Shelving location: Online Close shelf browser
|QA76.9.A25 K569 2014 Information Security Applications :||QA76.9.A25.K646 2017 Implementing Cybersecurity :||QA76.9.A25 K674 2015 The Antivirus Hacker's Handbook.||QA76.9.A25 K728 2009 Information Security Breaches :||QA76.9.A25 K73 2010 Managing Information Security Breaches :||QA76.9.A25 K732 2013 The true cost of information security breaches and cyber crime /||QA76.9.A25 .K738 2014 Managing information security breaches :|
INTRODUCTION; CHAPTER 1: WHAT CONSTITUTES A BREACH?; CHAPTER 2: TREATMENT USING ISO27001; Assess the damage; Past or future?; Initiate an investigation, secure all evidence; Evaluate evidence; Draft the report; Final decision; Follow up with tenacity; Review; How ISO27001 supports the treatment of breaches; CHAPTER 3: CASE STUDIES; Case study 1 small company; Case study 2 small company; Case study 3 medium-sized company; Case study 4 large company; ITG RESOURCES.
This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.
Includes bibliographical references.
Print version record.