Managing Information Security Breaches
Kort om boken
Forklaring av formater
Bok med hardt omslag.
Heftet bok med mykt omslag.
Bok med tykke, stive sider.
Digitalt format. E-bok kan leses i ARK-appen eller på Kindle. Bøkene kan også lastes ned fra Din side.
Digitalt format. Nedlastbar lydbok kan lyttes til i ARK-appen. Bøkene kan også lastes ned fra Din side.
Lydbok på digikort. Krever Digispiller.
Lydbok eller musikk på CD. Krever CD-spiller eller annen kompatibel avspiller.
Vinylplate. Krever platespiller.
DVD-film. Krever DVD-spiller eller annen kompatibel avspiller.
Blu-ray-film. Krever Blu-ray-spiller eller annen kompatibel avspiller.
Om Managing Information Security Breaches
Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses; major companies and government departments suffer from them as well.A strategic frameworkManaging Information Security Breaches sets out a strategic framework for handling this kind of emergency. It focuses on the treatment of severe breaches and on how to re-establish safety and security once the breach has occurred. These recommendations support the controls for the treatment of breaches specified under ISO27001:2005.Top prioritiesThe actions you take in response to a data breach can have a significant impact on your company's future. Michael Krausz explains what your top priorities should be the moment you realise a breach has occurred. This book is essential reading for security officers, IT managers and company directors. Read this guide and learn how to Avoid information security breachesThe author uses cases he has investigated to illustrate the various causes of a breach, ranging from the chance theft of a laptop at an airport to more systematic forms of data theft by criminal networks. By analysing situations companies have experienced in real life, the case studies can give you a unique insight into the best way for your organisation to avoid a data breach.Plan your responseIf something did go wrong, how would you handle it? Even if you have done everything possible to prevent a data breach, you still need to know what to do, should one occur. This book offers advice on the strategies and tactics to apply in order to identify the source of the leak, keep the damage to a minimum, and recover as swiftly as possible.Preserve the trust of your customersIf your company ever experiences an information security incident, then the way your customers see you will depend on how you react. This book tells you the key steps you need to take to hold on to the goodwill of your customers if a data breach occurs. The book also offers advice on what to do if you discover defamatory material about your business on YouTube or on forum sites.Improve management processesInformation security breaches are committed, often by ambitious or embittered employees. This book looks at ways to reduce the risk of staff selling product designs or customer data to your competitors for personal gain.This book provides a general discussion of, and a source of learning about, what information security breaches are, how they can be treated and what ISO27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. It is a 'first line of defence' for the reader who is affected by an incident and wants to turn to a source of guidance and direction.