Implementing Information Security based on ISO 27001 and ISO 17799: A Management Guide

Course

Distance

£ 19 + VAT

Description

  • Type

    Course

  • Methodology

    Distance Learning

This title covers the implementation issues of the information security standards up to and including audits. Pivotal to this it covers the installation of an ISMS, or Information Security Management System.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Course programme

Description
This title covers the implementation issues of the information security standards up to and including audits. Pivotal to this it covers the installation of an ISMS, or Information Security Management System.

Program



This title covers the implementation issues of the information security standards up to and including audits. Pivotal to this it covers the installation of an ISMS, or Information Security Management System. This is defined as 'that part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security. The management system includes organisational structure, policies, planning activities, responsibilities, practices, procedures, processes and resources.'




Purchase this book along with its sister title, Information Security based on ISO 27001 and ISO 17799: A Management Guide, by clicking on the link below. All at a very attractive price!

Two Management Guides on Information Security: ISO 27001


Effective information security is defined in the Standard as the 'preservation of confidentiality, integrity and availability of information.' It cannot be achieved through technological means alone, and should never be implemented in a way that is either out of line with the organisation's approach to risk or which undermines or creates difficulties for its business operations.

The ISMS includes 'organisational structure, policies, planning activities, responsibilities, practices, procedures, processes and resources' and is a structured, coherent management approach to information security. It should be designed to ensure the effective interaction of the three key attributes of information security:


  • process (or procedure)
  • technology
  • behaviour.

The book covers cultural and organisational issues that are key for successful adoption and certification. It covers strategic business decision-making and makes recommendations as to Board input. It notes that the design and implementation of the ISMS should be directly influenced by the organisation's 'needs and objectives, security requirements, the processes employed and the size and structure of the organisation.'


Author: Alan Calder
Publisher: Van Haren Publishing
ISBN 10: 9077212787
ISBN 13: 9789077212783
Pages: 80
Format: Soft Cover
Published Date: 28th June 2006
Availability: Ex Stock


This book gives a practical and pragmatic overview of ISMS implementation issues. Order online today .

Implementing Information Security based on ISO 27001 and ISO 17799: A Management Guide

£ 19 + VAT