Information Security Breaches: Avoidance and Treatment Based on ISO27001

172.80 EGP In stock

Although breaches of information security are not a new phenomenon, the methods used to perpetrate such breaches have changed considerably over the years. Leaking information to non-authorized people has always been an issue but, in the computer age, the speed and effectiveness with which breaches of information security can occur, and the amount of harm potentially caused are disturbing. Typically, ... more on CAIRO BOOKS

Buy it from CAIRO BOOKS
(0)
Report

Product Details

  • The best price of Information Security Breaches: Avoidance and Treatment Based on ISO27001 by CAIRO BOOKS in Egypt is 172.80 EGP
  • Available payment methods are
    Cash on Delivery
  • Delivery fees are 10 EGP, with delivery expected within 5-8 day(s)
  • Similar products to Information Security Breaches: Avoidance and Treatment Based on ISO27001 are sold at CAIRO BOOKS, Jumia with prices starting at 252 EGP
  • The first appearance of this product was on Aug 19, 2014

CAIRO BOOKS's Description

Although breaches of information security are not a new phenomenon, the methods used to perpetrate such breaches have changed considerably over the years. Leaking information to non-authorized people has always been an issue but, in the computer age, the speed and effectiveness with which breaches of information security can occur, and the amount of harm potentially caused are disturbing. Typically, also, they favor the perpetrator, not the victim. Modern companies depend on their IT systems, and it is clear that special care needs to be taken to keep systems safe and secure. This guide focuses solely on the aspects of re-establishing that safety and security once, despite all measures taken, a breach has occurred. We put breaches of information security in the context of ISO27001 which, since its inception as former British Standard 7799 in the late eighties, has provided a framework of requirements well suited to the effective implementation of counter-measures and measures designed to protect information in all its forms (whether on paper, in the spoken word, or within the IT sphere). This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. It provides input for decision making and breach classification, and case studies where the reader can check out how other companies were affected and what they did, or did not do, upon becoming the victim of a breach. This guide is aimed at CSOs, CISOs, IT Security Managers, CIOs and, last but not least, CEOs. It particularly addresses personnel in non-IT roles, in an effort to make this unwieldy subject more comprehensible to those who, in a worst-case scenario, will be on the receiving end of requests for six- or seven-figure excess budgets to cope with severe incidents.

Reviews

    No reviews exist yet for this product.

    Similar Products

    ProductStorePricePayment methodsDelivery timeFees
    When Children Refuse School: A Cognitive-Behavioral Therapy Approach Therapist Guide (Treatments That Work)
    When Children Refuse School: A Cognitive-B...
    Store:CAIRO BOOKSPrice: 252 EGPPayment methodsCash on DeliveryDelivery time: 5-8 day(s) Fees : 10 EGP Buy it
    Ajax Security
    Ajax Security
    Store:CAIRO BOOKSPrice: 330 EGPPayment methodsCash on DeliveryDelivery time: 5-8 day(s) Fees : 10 EGP Buy it
    Managing the Human Factor in Information Security: How to win over staff and influence business managers
    Managing the Human Factor in Information S...
    Store:CAIRO BOOKSPrice: 360 EGPPayment methodsCash on DeliveryDelivery time: 5-8 day(s) Fees : 10 EGP Buy it
    Microsoft Windows Server(TM) 2003 PKI and Certificate Security
    Microsoft Windows Server(TM) 2003 PKI and ...
    Store:JumiaPrice: 394 EGPPayment methodsCash on DeliveryCredit CardE-PaymentDelivery time: 2-5 day(s) Fees : 15 EGP Buy it
    Information Security Breaches: Avoidance and Treatment Based on ISO27001Information Security Breaches: Avoidance and Treatment Based on ISO27001





    ... or add to a new wish list.