Implementing Information Security based on ISO 27001 and ISO 17799: A Management Guide
Course
Distance
Description
-
Type
Course
-
Methodology
Distance Learning
This title covers the implementation issues of the information security standards up to and including audits. Pivotal to this it covers the installation of an ISMS, or Information Security Management System.
Reviews
Course programme
This title covers the implementation issues of the information security standards up to and including audits. Pivotal to this it covers the installation of an ISMS, or Information Security Management System.
Program
This title covers the implementation issues of the information security standards up to and including audits. Pivotal to this it covers the installation of an ISMS, or Information Security Management System. This is defined as 'that part of the overall management system, based on a business risk approach, to establish, implement, operate, monitor, review, maintain and improve information security. The management system includes organisational structure, policies, planning activities, responsibilities, practices, procedures, processes and resources.'
Purchase this book along with its sister title, Information Security based on ISO 27001 and ISO 17799: A Management Guide, by clicking on the link below. All at a very attractive price!
Two Management Guides on Information Security: ISO 27001
Effective information security is defined in the Standard as the 'preservation of confidentiality, integrity and availability of information.' It cannot be achieved through technological means alone, and should never be implemented in a way that is either out of line with the organisation's approach to risk or which undermines or creates difficulties for its business operations.
The ISMS includes 'organisational structure, policies, planning activities, responsibilities, practices, procedures, processes and resources' and is a structured, coherent management approach to information security. It should be designed to ensure the effective interaction of the three key attributes of information security:
- process (or procedure)
- technology
- behaviour.
Author: Alan Calder
Publisher: Van Haren Publishing
ISBN 10: 9077212787
ISBN 13: 9789077212783
Pages: 80
Format: Soft Cover
Published Date: 28th June 2006
Availability: Ex Stock
This book gives a practical and pragmatic overview of ISMS implementation issues. Order online today .
Implementing Information Security based on ISO 27001 and ISO 17799: A Management Guide