

The author, Alan Calder, knows ISO 27001 inside out: he is the founder and executive chairman of IT Governance, and he led the implementation of the first management system to achieve accredited certification to BS 7799 – the forerunner to ISO 27001 – and has been working with the Standard and its successors ever since.
Meer over Alan CalderImplementing Information Security based on ISO 27001 / 27002, A Management Guide
Paperback Engels 2009 9789087535414Samenvatting
Information is the currency of the information age and in many cases is the most valuable asset possessed by an organisation. Information security management is the discipline that focuses on protecting and securing these assets against the threats of natural disasters, fraud and other criminal activity, user error and system failure.
Effective information security can be defined as the preservation of confidentiality, integrity and availability of information. This book describes the approach taken by many organisations to realise these objectives. It discusses how information security cannot be achieved through technological means alone, but should include factors such as the organisations approach to risk and pragmatic day-to-day business operations.
This Management Guide provides an overview of the implementation of an Information Security Management System that conforms to the requirements of ISO/IEC 27001:2005 and which uses controls derived from ISO/IEC 17799:2005.
It covers the following:
- Certification
- Risk
- Documentation and Project Management issues
- Process approach and the PDCA cycle
- Preparation for an Audit
Specificaties
Lezersrecensies
Geef uw waardering
Inhoudsopgave
2. Information security and ISO 27001
3. Certification
4. ISO 27001 and ISO 27002
5. Frameworks and management system integration
6. Documentation requirements and record control
7. Project team
8. Project initiation
9. Process approach and the PDCA cycle
10. Plan-establish the ISMS
11. Scope definition
12. Risk management
13. Assets within scope
14. Assessing risk
15. Risk assessment tools
16. Risk assessment tools
17. Statement of applicability
18. Third party checklists and resources
19. Do-implement and operate the ISMS
20. check-monitor and review the ISMS
21. Act-maintain and improve the ISMS
22. Measurement
23. Preparing for an ISMS audit.
Rubrieken
- Advisering
- Algemeen management
- Coaching en trainen
- Communicatie en media
- Economie
- Financieel management
- Inkoop en logistiek
- Internet en social media
- IT-management / ICT
- Juridisch
- Leiderschap
- Marketing
- Mens en maatschappij
- Non-profit
- Ondernemen
- Organisatiekunde
- Personal finance
- Personeelsmanagement
- Persoonlijke effectiviteit
- Projectmanagement
- Psychologie
- Reclame en verkoop
- Strategisch management
- Verandermanagement
- Werk en loopbaan