An Introduction to Information Security and ISO 27001 by Steve G Watkins

Posted by

By Steve G Watkins

Show description

Read or Download An Introduction to Information Security and ISO 27001 PDF

Best project management books

Project Risk and Cost Analysis

Undertaking possibility and price research makes a speciality of probability within the context of venture administration, essentially within the region of risk's results on venture expenses, with emphasis at the many glossy instruments that assist you and your company quantify and deal with venture hazard. you are going to the way to practice a proper hazard and price research, practice the Earned worth solution to possibility administration, and alter time table and finances reserves safely on your undertaking stipulations.

The Project Manager's Guide to Purchasing

This very sensible consultant describes the complete technique of contracting for items and prone, from deciding on tenderers to putting a freelance. It information the foremost subject matters which are beneficial for achievement, equivalent to agreement technique, agreement kinds, agreement legislation and comparing tenders. while the publication additionally addresses the undertaking context within which procuring happens, the subject material may well both be utilized to any enterprise context.

The Influence of Blockholders on Agency Costs and Firm Value: An Empirical Examination of Blockholder Characteristics and Interrelationships for German Listed Firms

Markus P. city investigates the impression of enormous shareholders (the so-called blockholders) on business enterprise bills and enterprise price, thereby accounting for blockholder features and blockholder interrelationships. The paintings presents a profound theoretical and empirical research at the nature and impact of shareholder engagement with due regard to the specifics of the German institutional atmosphere.

Liftoff: Start and Sustain Successful Agile Teams

Prepared, set, liftoff! Align your group to at least one objective: profitable supply. study new insights and methods for beginning tasks and groups the ideal approach, with elevated ideas for making plans, organizing, and engaging in liftoff conferences. Real-life tales illustrate how others have successfully begun (or restarted) their groups and tasks.

Extra info for An Introduction to Information Security and ISO 27001

Example text

Compliance is often used in a legal context. Conformance: fulfilment of a requirement. ’ Hence nonconformance and conformance monitoring. Conformance is often used in a non-legal context. Document control: a system whereby all documents within the system have a standard numbering system that identifies where they sit within that system, as well as a version number, an issue date and a document owner, so that the currency of the document is always clear. When a controlled document is amended, all copies of it should be simultaneously withdrawn and replaced by the new version.

ISMS: see Information security management system. ISO: acronym, from the Greek isos (‘equal to’), adopted by the International Organisation for Standardisation – the world’s largest developer of standards. Its membership comprises the nationalstandards bodies of countries around the world. ISO27002:2005: the international code of best practice for information security which underpins and provides guidance for the implementation of an ISMS, specifically the revised version issued in 2005. It includes individual information security controls, implementation guidance and other information relating to these.

Eradicating poor practices such as writing passwords down, or using sequences or easily guessable combinations, should be strongly discouraged. Where access issues are risk assessed as requiring a greater degree of assurance, say with regard to accessing a system or application remotely, there is the possibility of two-factor authentication. This is where each unique user has to deploy in combination both a physical key (token) and a logical key (password) to be granted access. An example here is a credit card being swiped in a store (the magnetic strip or smart chip being the physical key) and your personal identification number (PIN – the logical key).

Download PDF sample

Rated 4.70 of 5 – based on 37 votes