語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security incident and data breach management = a step-by-step approach /
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Information security incident and data breach management/ by John Kyriazoglou.
其他題名:
a step-by-step approach /
作者:
Kyriazoglou, John.
出版者:
Berkeley, CA :Apress : : 2024.,
面頁冊數:
xxiii, 156 p. :ill., digital ; : 24 cm.;
Contained By:
Springer Nature eBook
標題:
Data and Information Security. -
電子資源:
https://doi.org/10.1007/979-8-8688-0870-8
ISBN:
9798868808708
Information security incident and data breach management = a step-by-step approach /
Kyriazoglou, John.
Information security incident and data breach management
a step-by-step approach /[electronic resource] :by John Kyriazoglou. - Berkeley, CA :Apress :2024. - xxiii, 156 p. :ill., digital ;24 cm.
Chapter 1. Information Security and Breach Obligations and Definitions -- Chapter 2. Summarizing ISO 27K and Major Privacy Regulations -- Chapter 3: Information Security and Data Breach Response Framework -- Chapter 4. Managing Information Security Incidents -- Chapter 5. Investigating Cyber Crimes -- Chapter 6. Managing Data Breaches -- Chapter 7. Improving Security Incident and Data Breach Responses -- Appendix 1: Threat Intelligence Policy -- Appendix 2: IT Logging Policy -- Appendix 3: Minimum IT Security and Privacy Controls -- Appendix 4: Staff Education and Training Policy -- Appendix 5: IT and Digital Skills Checklist -- Appendix 6: Glossary of IT Concepts and Terms -- Appendix 7: Privacy Awareness, Communication and Training Plan -- Appendix 8: Information Security Incident Reporting Policy -- Appendix 9: Information Security Incident Reporting Form -- Appendix 10: Data Breach Reporting Form.
In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company's reputation and brand name. What You Will Learn Identify and manage information security incidents and data breaches more effectively Understand the importance of incident response in avoiding compliance issues, sanctions, and reputational damage Review case studies and examples that illustrate best practices and common pitfalls in incident response and data breach management Benefit from a well-tested approach that goes beyond the NIST 800-61 standard, aligning with the international information security standard ISO 27001:2022.
ISBN: 9798868808708
Standard No.: 10.1007/979-8-8688-0870-8doiSubjects--Topical Terms:
1365785
Data and Information Security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security incident and data breach management = a step-by-step approach /
LDR
:03787nam a2200349 a 4500
001
1138626
003
DE-He213
005
20241025125728.0
006
m d
007
cr nn 008maaau
008
250117s2024 cau s 0 eng d
020
$a
9798868808708
$q
(electronic bk.)
020
$a
9798868808692
$q
(paper)
024
7
$a
10.1007/979-8-8688-0870-8
$2
doi
035
$a
979-8-8688-0870-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
K99 2024
100
1
$a
Kyriazoglou, John.
$3
1462433
245
1 0
$a
Information security incident and data breach management
$h
[electronic resource] :
$b
a step-by-step approach /
$c
by John Kyriazoglou.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxiii, 156 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. Information Security and Breach Obligations and Definitions -- Chapter 2. Summarizing ISO 27K and Major Privacy Regulations -- Chapter 3: Information Security and Data Breach Response Framework -- Chapter 4. Managing Information Security Incidents -- Chapter 5. Investigating Cyber Crimes -- Chapter 6. Managing Data Breaches -- Chapter 7. Improving Security Incident and Data Breach Responses -- Appendix 1: Threat Intelligence Policy -- Appendix 2: IT Logging Policy -- Appendix 3: Minimum IT Security and Privacy Controls -- Appendix 4: Staff Education and Training Policy -- Appendix 5: IT and Digital Skills Checklist -- Appendix 6: Glossary of IT Concepts and Terms -- Appendix 7: Privacy Awareness, Communication and Training Plan -- Appendix 8: Information Security Incident Reporting Policy -- Appendix 9: Information Security Incident Reporting Form -- Appendix 10: Data Breach Reporting Form.
520
$a
In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company's reputation and brand name. What You Will Learn Identify and manage information security incidents and data breaches more effectively Understand the importance of incident response in avoiding compliance issues, sanctions, and reputational damage Review case studies and examples that illustrate best practices and common pitfalls in incident response and data breach management Benefit from a well-tested approach that goes beyond the NIST 800-61 standard, aligning with the international information security standard ISO 27001:2022.
650
1 4
$a
Data and Information Security.
$3
1365785
650
0
$a
Data protection
$x
Management.
$3
965959
650
0
$a
Computer security.
$3
557122
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0870-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入