Information Security Breaches

Information Security Breaches

Avoidance and Treatment Based on ISO27001

Unknown - 2009
Rate this:
This pocket guide outlines a process and its elements for the treatment of severe breaches, and places them in the context of the associated ISO27001 controls. Firslty it offers a general discussion of what information security breaches are, and secondly it helps rform a first line of defence for the reader who is the victim of an incident and is looking for guidance and direction.
Publisher: Ely : IT Governance Pub., 2009.
Characteristics: 1 online resource (56 pages)

Opinion

From the critics


Community Activity

Comment

Add a Comment

There are no comments for this title yet.

Age Suitability

Add Age Suitability

There are no age suitabilities for this title yet.

Summary

Add a Summary

There are no summaries for this title yet.

Notices

Add Notices

There are no notices for this title yet.

Quotes

Add a Quote

There are no quotes for this title yet.

Explore Further

Recommendations

Subject Headings

  Loading...
No similar edition of this title was found at APL.

Try searching for Information Security Breaches to see if APL owns related versions of the work.


  Loading...
[]
[]
To Top