skip to content
Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines Preview this item
ClosePreview this item
Checking...

Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines

Author: Abhishek Chopra; Mukund Chaudhary
Publisher: Berkeley, CA : Apress L. P., ©2020.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Chopra, Abhishek
Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines
Berkeley, CA : Apress L. P.,c2019
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Abhishek Chopra; Mukund Chaudhary
ISBN: 9781484254134 1484254139
OCLC Number: 1132426369
Notes: Description based upon print version of record.
Risk Components
Description: 1 online resource (284 p.)
Contents: Intro --
Table of Contents --
About the Authors --
About the Technical Reviewer --
Acknowledgments --
Introduction --
Chapter 1: The Need for Information Security --
What Is Information Security? --
Data --
Information --
How ISO 27001 Applies to You --
ISO 27001: Information Security Management System --
Confidentiality --
Integrity --
Availability --
Why Is It Important to Safeguard Information? --
Yahoo --
Marriott International --
eBay --
Heartland Payment Systems --
Uber --
NHS Cyberattack --
Safeguarding Summary --
Scenario 1: Banking --
Cosmos Bank Cyberattack Scenario 2: Trade Secrets --
Scenario 3: Healthcare --
Scenario 4: Manufacturing --
Stuxnet Virus --
Scenario 5: Information Technology --
Summary --
Chapter 2: Assessing Needs and Scope --
Assessing Business Needs --
Scope and High-level Timeframe for Implementation --
What's Covered in the Scope Document? --
What Is the Statement of Applicability (SOA)? --
Section A.5 of the Annexure --
Responsibility --
Section A.6 of the Annexure --
Responsibility --
Section A.7 of the Annexure --
Responsibility --
Section A.8 of the Annexure --
Responsibility --
Section A.9 of the Annexure --
Responsibility Section A.10 of the Annexure --
Responsibility --
Section A.11 of the Annexure --
Responsibility --
Section A.12 of the Annexure --
Responsibility --
Section A.13 of the Annexure --
Responsibility --
Section A.14 of the Annexure --
Responsibility --
Section A.15 of the Annexure --
Responsibility --
Section A.16 of the Annexure --
Responsibility --
Section A.17 of the Annexure --
Responsibility --
Section A.18 of the Annexure --
Responsibility --
High-Level Timeframe --
Senior Management Support --
Summary --
Reference --
Chapter 3: Project Kick-Off --
Presenting a High-Level Plan Setting Up the Project Taskforce --
Administration Department --
Chief Information Security Officer (CISO) --
System Admin or IT Manager --
Information Security Management (ISM) Team --
Human Resources Management --
Getting Commitment --
Summary --
Chapter 4: Initial Risk Assessment --
Meeting the Team --
Annex 5: Information Security Policies --
Annex 6: Organization of Information Security --
Annex 7: Human Resources Security --
Annex 8: Asset Management --
Annex 9: Access Control --
Annex 10: Cryptographic Control --
Annex 11: Physical and Environmental Security Annex 12: Operations Security --
Annex 13: Communications Security --
Annex 14: Security Requirements of Information Systems --
Security in Development and Support Processes --
Define a Secure Development Policy --
Test Data --
Annex 15: Supplier Relationships --
Annex 16: Information Security Incident Management --
Annex 17: Information Security Aspects of Business Continuity Management --
Annex 18: Compliance --
Preparing the Analysis Report --
Presenting the Report to Management/Teams --
Summary --
Chapter 5: Risk Management Approach --
Defining and Finalizing the Risk Assessment Framework
Responsibility: Abhishek Chopra, Mukund Chaudhary.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1132426369> # Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "1132426369" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/9847012686#Place/berkeley_ca> ; # Berkeley, CA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'https://img1.od-cdn.com/ImageType-100/7614-1/{5D7733A7-B2BB-443A-9E53-811D8A31F108}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9847012686#Topic/computer_security_management> ; # Computer security--Management
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/9847012686#Person/chaudhary_mukund> ; # Mukund Chaudhary
    schema:copyrightYear "2020" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/9847012686#Person/chopra_abhishek> ; # Abhishek Chopra
    schema:datePublished "2020" ;
    schema:description "Intro -- Table of Contents -- About the Authors -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: The Need for Information Security -- What Is Information Security? -- Data -- Information -- How ISO 27001 Applies to You -- ISO 27001: Information Security Management System -- Confidentiality -- Integrity -- Availability -- Why Is It Important to Safeguard Information? -- Yahoo -- Marriott International -- eBay -- Heartland Payment Systems -- Uber -- NHS Cyberattack -- Safeguarding Summary -- Scenario 1: Banking -- Cosmos Bank Cyberattack"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9847012686> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/9847012686#CreativeWork/implementing_an_information_security_management_system_security_management_based_on_iso_27001_guidelines> ;
    schema:name "Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines"@en ;
    schema:productID "1132426369" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1132426369#PublicationEvent/berkeley_ca_apress_l_p_c2020> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/9847012686#Agent/apress_l_p> ; # Apress L. P.
    schema:url <https://www.overdrive.com/search?q=5D7733A7-B2BB-443A-9E53-811D8A31F108> ;
    schema:url <http://public.eblib.com/choice/PublicFullRecord.aspx?p=5995828> ;
    schema:url "https://img1.od-cdn.com/ImageType-100/7614-1/{5D7733A7-B2BB-443A-9E53-811D8A31F108}Img100.jpg" ;
    schema:url <https://doi.org/10.1007/978-1-4842-5413-4> ;
    schema:url <https://samples.overdrive.com/?crid=5d7733a7-b2bb-443a-9e53-811d8a31f108&.epub-sample.overdrive.com> ;
    schema:workExample <http://worldcat.org/isbn/9781484254134> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1132426369> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9847012686#Agent/apress_l_p> # Apress L. P.
    a bgn:Agent ;
    schema:name "Apress L. P." ;
    .

<http://experiment.worldcat.org/entity/work/data/9847012686#Person/chaudhary_mukund> # Mukund Chaudhary
    a schema:Person ;
    schema:familyName "Chaudhary" ;
    schema:givenName "Mukund" ;
    schema:name "Mukund Chaudhary" ;
    .

<http://experiment.worldcat.org/entity/work/data/9847012686#Person/chopra_abhishek> # Abhishek Chopra
    a schema:Person ;
    schema:familyName "Chopra" ;
    schema:givenName "Abhishek" ;
    schema:name "Abhishek Chopra" ;
    .

<http://experiment.worldcat.org/entity/work/data/9847012686#Topic/computer_security_management> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://worldcat.org/entity/work/data/9847012686#CreativeWork/implementing_an_information_security_management_system_security_management_based_on_iso_27001_guidelines>
    a schema:CreativeWork ;
    rdfs:label "Implementing an Information Security Management System : Security Management Based on ISO 27001 Guidelines" ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1132426369> ; # Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines
    .

<http://worldcat.org/isbn/9781484254134>
    a schema:ProductModel ;
    schema:isbn "1484254139" ;
    schema:isbn "9781484254134" ;
    .

<http://www.worldcat.org/title/-/oclc/1132426369>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/1132426369> ; # Implementing an Information Security Management System Security Management Based on ISO 27001 Guidelines
    schema:dateModified "2020-02-08" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.