Information Security Breaches Information Security Breaches

Information Security Breaches

Avoidance and Treatment based on ISO27001

    • $18.99
    • $18.99

Publisher Description

How would your business respond to an information security breach?
If you are running a business, you learn to expect the unexpected. Even if you have taken all the right precautions, your company might still find itself confronted with an information security breach. How would your business cope then?

There are lots of books that will tell you what to do to prevent an information security breach. This book is different. It tells you what you have to do if a security breach occurs.
 

Security breaches sometimes occur because computers containing sensitive information are not returned to their owners. NATO laptops have been spotted in flea markets, and US government computers were put up for sale on Ebay. Security breaches may also be the result of data theft. A bad apple in your company may be tempted to sell your confidential data to a rival firm.

If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001.

GENRE
Computers & Internet
RELEASED
2009
December 9
LANGUAGE
EN
English
LENGTH
60
Pages
PUBLISHER
IT Governance Publishing
SELLER
IT Governance
SIZE
212.7
KB
Retail Crime, Security, and Loss Prevention Retail Crime, Security, and Loss Prevention
2011
Preserving Electronic Evidence for Trial Preserving Electronic Evidence for Trial
2016
Managing Fraud Risk Managing Fraud Risk
2012
The Claim Game The Claim Game
2015
Corporate Investigations, Corporate Justice and Public-Private Relations Corporate Investigations, Corporate Justice and Public-Private Relations
2019
Practical Approach to Prevention and Detection of Fraud Practical Approach to Prevention and Detection of Fraud
2012
Dialogues on Relativism, Absolutism, and Beyond Dialogues on Relativism, Absolutism, and Beyond
2011
The True Cost of Information Security Breaches and Cyber Crime The True Cost of Information Security Breaches and Cyber Crime
2013