- Taschenbuch: 164 Seiten
- Verlag: Van Haren Publishing; Auflage: 00002 (5. Juni 2010)
- Sprache: Englisch
- ISBN-10: 9087535686
- ISBN-13: 978-9087535681
- Größe und/oder Gewicht: 17 x 0,9 x 24 cm
- Durchschnittliche Kundenbewertung: 1 Kundenrezension
- Amazon Bestseller-Rang: Nr. 205.523 in Fremdsprachige Bücher (Siehe Top 100 in Fremdsprachige Bücher)
Foundations of it Security-Based on ISO27001 and ISO27002 (Best Practice (Van Haren Publishing)) (Englisch) Taschenbuch – 5. Juni 2010
Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.
Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.
Information security issues impact all organizations; however measures used to implement effective measures are often viewed as a businesses barrier costing a great deal of money. This practical title clearly explains the approaches that most organizations can consider and implement which helps turn Information Security management into an approachable, effective and well-understood tool. It covers: * The quality requirements an organization may have for information; * The risks associated with these quality requirements; * The countermeasures that are necessary to mitigate these risks; * Ensuring business continuity in the event of a disaster; * When and whether to report incidents outside the organization. All information security concepts in this book are based on the ISO/IEC 27001 and ISO/IEC 27002 standards. But the text also refers to the other relevant international standards for information security. The text is structures as follows: * Fundamental Principles of Security and Information security and Risk management. * Architecture, processes and information, needed for basic understanding of what information security is about. * Business Assets are discussed. * Measures that can be taken to protect information assets. (Physical measures,technical measures and finally the organizational measures. ) The book also contains many Case Studies which usefully demonstrate how theory translates into an operating environment This book is primarily developed as a study book for anyone who wants to pass the ISFS (Information Security Foundation) exam of EXIN. In an appendix an ISFS model exam is given, with feedback to all multiple choice options, so that it can be used as a training for the 'real' ISFS exam.