The Resource Managing information security breaches : studies from real life, Michael Krausz

Managing information security breaches : studies from real life, Michael Krausz

Label
Managing information security breaches : studies from real life
Title
Managing information security breaches
Title remainder
studies from real life
Statement of responsibility
Michael Krausz
Creator
Contributor
Author
Provider
Subject
Language
eng
Summary
This book provides a general discussion and education about information security breaches, how they can be treated and what ISO27001 can offer in that regard, spiced with a number of real-life stories of information security incidents and breaches. These case studies enable an in-depth analysis of the situations companies face in real life, and contain valuable lessons an organisation can learn from when putting appropriate measures in place to prevent a breach. The author explains what your top priorities should be the moment you realise a breach has occured, making this book essential reading for IT security managers, chief security officers, chief information officers and chief executive officers. It will be of use to personnel in non-IT roles, in an effort to make this subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents." --
Assigning source
Edited summary from book
Cataloging source
E7B
http://library.link/vocab/creatorName
Krausz, Michael
Illustrations
illustrations
Index
no index present
LC call number
QA76.9.A25
LC item number
.K738 2014eb
Literary form
non fiction
Nature of contents
dictionaries
http://library.link/vocab/relatedWorkOrContributorName
JSTOR
http://library.link/vocab/subjectName
  • Computer security
  • Computer crimes
  • Electronic information resources
  • Computer crimes
  • Computer security
  • Electronic information resources
  • COMPUTERS
  • Computer crimes
  • Computer security
  • Electronic information resources
Label
Managing information security breaches : studies from real life, Michael Krausz
Instantiates
Publication
Copyright
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • ""Foreword""; ""Preface""; ""About the Author""; ""Acknowledgements""; ""Contents""; ""Introduction""; ""Part 1 â€? General""; ""Chapter 1: Why Risk does Not Depend on Company Size""; ""Risk effect""; ""Propagation of damage (downstream effects)""; ""Culture""; ""Information security staff""; ""Cash reserves / cash at hand""; ""Ability to improvise / make quick decisions""; ""Preparedness""; ""Contacts with authority""; ""Chapter 2: Getting your Risk Profile Right""; ""Intuitive risk analysis""; ""Formal risk analysis""; ""Step 1 â€? Identifying threats""
  • ""Step 2 â€? Assigning damage and likelihood""""Step 3 â€? Defining acceptable loss""; ""Step 4 â€? Defining mitigation priorities (business priorities)""; ""Residual risks""; ""Chapter 3: What is a Breach?""; ""Confidentiality breach""; ""Availability breach""; ""Integrity breach""; ""Impact""; ""Source""; ""External vs. internal""; ""Unintentional vs. intentional""; ""Manual vs. automatic""; ""Human vs. nature""; ""General treatment options""; ""Chapter 4: General Avoidance and Mitigation Strategies""; ""Introduction â€? general aspects, avoidance and related ISO27001 controls""; ""People""
  • ""A.7.1.1 â€? Screening""""Methods of screening""; ""A.7.1.2 â€? Terms and conditions of employment""; ""A.7.2.1 â€? Management responsibilities""; ""A.7.2.2 â€? Information security awareness, education and training""; ""A.7.2.3 â€? Disciplinary process""; ""A.7.3.1 â€? Termination or change of employment""; ""A.8.1.4 â€? Return of assets""; ""A.9.2.6 â€? Removal or adjustment of access rights""; ""Processes""; ""Technology""; ""ISO27001 Controls helpful for treatment of breaches""; ""A.6.1.3 â€? Contact with authorities""
  • ""A.7.2.2 â€? Information security awareness, education and training""""A.7.2.3 â€? Disciplinary process A.8.1.4 â€? Return of assets A.9.2.6 â€? Removal or adjustment of access rights""; ""A.12.2.1 â€? Controls against malware""; ""A.12.4.1 â€? Event logging and""; ""A.12.4.2 â€? Protection of log information""; ""A.16.1.1 â€? Responsibilities and procedures""; ""A.16.1.2 â€? Reporting information security events""; ""A.16.1.3 â€? Reporting security weaknesses""; ""A.16.1.4 â€? Assessment of and decision on information security events""
  • ""A.16.1.5 â€? Response to information security incidents""""A.16.1.6 â€? Learning from information security incidents""; ""A.16.1.7 â€? Collection of evidence""; ""Strategies and tactics for treating breaches""; ""Tactical advice""; ""Regular meetings""; ""Time, time, time""; ""Rest""; ""People (number)""; ""International contacts""; ""Keep the information flowing""; ""Keep minutes""; ""Additional quality feedback""; ""Dimensions of treatment / mitigation of information security breaches""; ""None""; ""Internal investigation""; ""External investigation""; ""Joint task force""
Dimensions
unknown
Edition
Second edition.
Extent
1 online resource (199 pages)
Form of item
online
Isbn
9781849285964
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
color illustrations, tables
Specific material designation
remote
Stock number
22573/ctt14s2vgh
System control number
  • (OCoLC)905916579
  • (OCoLC)ocn905916579
Label
Managing information security breaches : studies from real life, Michael Krausz
Publication
Copyright
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • ""Foreword""; ""Preface""; ""About the Author""; ""Acknowledgements""; ""Contents""; ""Introduction""; ""Part 1 â€? General""; ""Chapter 1: Why Risk does Not Depend on Company Size""; ""Risk effect""; ""Propagation of damage (downstream effects)""; ""Culture""; ""Information security staff""; ""Cash reserves / cash at hand""; ""Ability to improvise / make quick decisions""; ""Preparedness""; ""Contacts with authority""; ""Chapter 2: Getting your Risk Profile Right""; ""Intuitive risk analysis""; ""Formal risk analysis""; ""Step 1 â€? Identifying threats""
  • ""Step 2 â€? Assigning damage and likelihood""""Step 3 â€? Defining acceptable loss""; ""Step 4 â€? Defining mitigation priorities (business priorities)""; ""Residual risks""; ""Chapter 3: What is a Breach?""; ""Confidentiality breach""; ""Availability breach""; ""Integrity breach""; ""Impact""; ""Source""; ""External vs. internal""; ""Unintentional vs. intentional""; ""Manual vs. automatic""; ""Human vs. nature""; ""General treatment options""; ""Chapter 4: General Avoidance and Mitigation Strategies""; ""Introduction â€? general aspects, avoidance and related ISO27001 controls""; ""People""
  • ""A.7.1.1 â€? Screening""""Methods of screening""; ""A.7.1.2 â€? Terms and conditions of employment""; ""A.7.2.1 â€? Management responsibilities""; ""A.7.2.2 â€? Information security awareness, education and training""; ""A.7.2.3 â€? Disciplinary process""; ""A.7.3.1 â€? Termination or change of employment""; ""A.8.1.4 â€? Return of assets""; ""A.9.2.6 â€? Removal or adjustment of access rights""; ""Processes""; ""Technology""; ""ISO27001 Controls helpful for treatment of breaches""; ""A.6.1.3 â€? Contact with authorities""
  • ""A.7.2.2 â€? Information security awareness, education and training""""A.7.2.3 â€? Disciplinary process A.8.1.4 â€? Return of assets A.9.2.6 â€? Removal or adjustment of access rights""; ""A.12.2.1 â€? Controls against malware""; ""A.12.4.1 â€? Event logging and""; ""A.12.4.2 â€? Protection of log information""; ""A.16.1.1 â€? Responsibilities and procedures""; ""A.16.1.2 â€? Reporting information security events""; ""A.16.1.3 â€? Reporting security weaknesses""; ""A.16.1.4 â€? Assessment of and decision on information security events""
  • ""A.16.1.5 â€? Response to information security incidents""""A.16.1.6 â€? Learning from information security incidents""; ""A.16.1.7 â€? Collection of evidence""; ""Strategies and tactics for treating breaches""; ""Tactical advice""; ""Regular meetings""; ""Time, time, time""; ""Rest""; ""People (number)""; ""International contacts""; ""Keep the information flowing""; ""Keep minutes""; ""Additional quality feedback""; ""Dimensions of treatment / mitigation of information security breaches""; ""None""; ""Internal investigation""; ""External investigation""; ""Joint task force""
Dimensions
unknown
Edition
Second edition.
Extent
1 online resource (199 pages)
Form of item
online
Isbn
9781849285964
Media category
computer
Media MARC source
rdamedia
Media type code
c
Other physical details
color illustrations, tables
Specific material designation
remote
Stock number
22573/ctt14s2vgh
System control number
  • (OCoLC)905916579
  • (OCoLC)ocn905916579

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...