Books > Computing & IT > Computer communications & networking > Network security
|
Buy Now
Information Security Breaches - Avoidance and Treatment Based on ISO27001 (Paperback, 2nd Revised edition)
Loot Price: R434
Discovery Miles 4 340
|
|
Information Security Breaches - Avoidance and Treatment Based on ISO27001 (Paperback, 2nd Revised edition)
(sign in to rate)
Loot Price R434
Discovery Miles 4 340
Expected to ship within 10 - 15 working days
|
Donate to Gift Of The Givers
Total price: R454
Discovery Miles: 4 540
|
This pocket guide provides a general discussion of what information
security breaches are, how they can be treated, and what ISO27001
offers in that respect, illustrated with details of real-life
information security incidents. If something happens, your company
needs to be ready to take prompt and decisive action to resolve the
issue. This book tells you the plans and procedures you need to put
in place to tackle an information security breach should it occur.
In particular, the book gives you clear guidance on how to treat an
information security breach in accordance with ISO27001:2013. If a
breach occurs, the evidence needs to be secured professionally. You
need to know the rules on evidence gathering, and you need to be
capable of isolating the suspect laptops right from the start. If
you want your company to respond rapidly to an information security
breach, you need to make sure that the responsibilities and roles
in your company are clearly defined. Benefits to business include:
Recover faster An information security breach can have crippling
consequences. However, with the right emergency measures in place,
you will be able to recover quickly from the incident and resume
normal operations. Preserve customer confidence An information
security breach can result in loss of records and disruption to
service. This can do serious damage to your relationship with your
customers. It is vital for you to be prepared for an information
security breach, so that if it ever happens you can preserve
customer confidence. Assist the investigation Uncovering the root
causes of an information security breach requires detective work.
If an information security breach occurs, the investigators will
need to be able to identify the problem. You can help them to do
that by keeping proper records. Catch the criminals In the event of
data theft, you will want to be in a position to act promptly and
decisively. So you should set up an incident management system.
This will mean that in the event of data theft, the police will
have a greater chance of getting hold of the incriminating evidence
they need to secure a conviction.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!
|
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.