語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Information security incident and da...
~
Kyriazoglou, John.
Information security incident and data breach managementa step-by-step approach /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Information security incident and data breach managementby John Kyriazoglou.
其他題名:
a step-by-step approach /
作者:
Kyriazoglou, John.
出版者:
Berkeley, CA :Apress :2024.
面頁冊數:
xxiii, 156 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Computer security.
電子資源:
https://doi.org/10.1007/979-8-8688-0870-8
ISBN:
9798868808708$q(electronic bk.)
Information security incident and data breach managementa step-by-step approach /
Kyriazoglou, John.
Information security incident and data breach management
a step-by-step approach /[electronic resource] :by John Kyriazoglou. - Berkeley, CA :Apress :2024. - xxiii, 156 p. :ill., digital ;24 cm.
Chapter 1. Information Security and Breach Obligations and Definitions -- Chapter 2. Summarizing ISO 27K and Major Privacy Regulations -- Chapter 3: Information Security and Data Breach Response Framework -- Chapter 4. Managing Information Security Incidents -- Chapter 5. Investigating Cyber Crimes -- Chapter 6. Managing Data Breaches -- Chapter 7. Improving Security Incident and Data Breach Responses -- Appendix 1: Threat Intelligence Policy -- Appendix 2: IT Logging Policy -- Appendix 3: Minimum IT Security and Privacy Controls -- Appendix 4: Staff Education and Training Policy -- Appendix 5: IT and Digital Skills Checklist -- Appendix 6: Glossary of IT Concepts and Terms -- Appendix 7: Privacy Awareness, Communication and Training Plan -- Appendix 8: Information Security Incident Reporting Policy -- Appendix 9: Information Security Incident Reporting Form -- Appendix 10: Data Breach Reporting Form.
In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company's reputation and brand name. What You Will Learn Identify and manage information security incidents and data breaches more effectively Understand the importance of incident response in avoiding compliance issues, sanctions, and reputational damage Review case studies and examples that illustrate best practices and common pitfalls in incident response and data breach management Benefit from a well-tested approach that goes beyond the NIST 800-61 standard, aligning with the international information security standard ISO 27001:2022.
ISBN: 9798868808708$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0870-8doiSubjects--Topical Terms:
184416
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Information security incident and data breach managementa step-by-step approach /
LDR
:03788nmm a2200349 a 4500
001
671642
003
DE-He213
005
20241025125728.0
006
m d
007
cr nn 008maaau
008
250325s2024 cau s 0 eng d
020
$a
9798868808708$q(electronic bk.)
020
$a
9798868808692$q(paper)
024
7
$a
10.1007/979-8-8688-0870-8
$2
doi
035
$a
979-8-8688-0870-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
K99 2024
100
1
$a
Kyriazoglou, John.
$3
984665
245
1 0
$a
Information security incident and data breach management
$h
[electronic resource] :
$b
a step-by-step approach /
$c
by John Kyriazoglou.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xxiii, 156 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1. Information Security and Breach Obligations and Definitions -- Chapter 2. Summarizing ISO 27K and Major Privacy Regulations -- Chapter 3: Information Security and Data Breach Response Framework -- Chapter 4. Managing Information Security Incidents -- Chapter 5. Investigating Cyber Crimes -- Chapter 6. Managing Data Breaches -- Chapter 7. Improving Security Incident and Data Breach Responses -- Appendix 1: Threat Intelligence Policy -- Appendix 2: IT Logging Policy -- Appendix 3: Minimum IT Security and Privacy Controls -- Appendix 4: Staff Education and Training Policy -- Appendix 5: IT and Digital Skills Checklist -- Appendix 6: Glossary of IT Concepts and Terms -- Appendix 7: Privacy Awareness, Communication and Training Plan -- Appendix 8: Information Security Incident Reporting Policy -- Appendix 9: Information Security Incident Reporting Form -- Appendix 10: Data Breach Reporting Form.
520
$a
In today's digital landscape, safeguarding sensitive information is paramount. This book offers a comprehensive roadmap for managing and mitigating the impact of security incidents and data breaches. This essential guide goes beyond the basics, providing expert insights and strategies to help organizations of all sizes navigate the complexities of cybersecurity. With seven in-depth chapters and 10 appendices, this book covers everything from defining information security incidents and data breaches to understanding key privacy regulations such as GDPR and LGPD. You'll learn a practical, step-by-step approach to incident response, including how to assess and improve your organization's security posture. The book contains a well-tested and practical information security incident and breach management approach to manage information security incidents and data privacy breaches in four phases: Security and Breach Obligations and Requirements Comprehension; Security and Privacy Framework Assurance; Security Incident and Data Breach Response Management; and Security and Breach Response Process Evaluation. Knowing how to handle such security and breach issues will avoid compliance and sanctions to organizations of all types and protect the company's reputation and brand name. What You Will Learn Identify and manage information security incidents and data breaches more effectively Understand the importance of incident response in avoiding compliance issues, sanctions, and reputational damage Review case studies and examples that illustrate best practices and common pitfalls in incident response and data breach management Benefit from a well-tested approach that goes beyond the NIST 800-61 standard, aligning with the international information security standard ISO 27001:2022.
650
0
$a
Computer security.
$3
184416
650
0
$a
Data protection
$x
Management.
$3
267796
650
1 4
$a
Data and Information Security.
$3
913130
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0870-8
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000248220
電子館藏
1圖書
電子書
EB QA76.9.A25 K99 2024 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-0870-8
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入