Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
It governance
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

It governance

It governance

A manager's guide to data security and BS 7799 / ISO 17799

Alan Calder, Steve Watkins

342 pages, parution le 15/07/2003

Résumé

The DTI's Information Security Breaches Survey (ISBS) in 2002 showed that the number of organizations suffering a malicious (as distinct from accidental) breach doubled to 44 per cent, in comparison with ISBS 2000. 78 per cent of large businesses suffered at least one malicious security breach and, while the average cost of serious security incidents was £30K, several businesses had incidents that cost more than £500K. With the growing importance of IT to both internal systems and external e-commerce, this may be alarming but perhaps not surprising. What is surprising is that, up until very recently, data security has been seen as the province of the IT department rather than, as it should be, a key board-room issue for the e-commerce age.

The Turnbull report has focused interest in this issue by setting out how directors of listed companies must comply with the UK's Combined Code requirements in respect of internal controls including both financial, risk management and operational - specifically operational from an IT perspective. By underlining the importance of IT Governance as a critical aspect of Corporate Governance the report establishes 'best practice' for any organization both public and private, large and small.

The development of IT Governance - which recognizes the convergence between business management and IT management - makes it essential for managers at all levels of the organization to adopt 'best practice' in information security. By taking on BS 7799 or ISO 17799 organizations can be certain that they are doing this.

This new edition of this important handbook, fully updated with the 2002 version of the BS 7799 standard, will guide managers through the maze of issues involved in effective information security management and show how to introduce reliable management controls. In so doing, it also goes into detail through the process of achieving BS or ISO certification.

It is an essential resource for directors and senior managers in organizations of all sorts and sizes but particularly those with well-developed internal IT systems and those focused on e-commerce.

L'auteur - Alan Calder

Alan Calder is CEO of Wide Learning, a supplier of e-learning, and was previously CEO of Focus Central London and, before that, of Business Link London City Partners (BLLCP). He was also a member of the DTI’s Information Age Competitiveness Working Group. He is a non-executive director of DNV Certification Services Ltd, a company that certifies compliance with international standards including BS 7799. He is also a Director of IT Governance Ltd, which provides information security services through its web site at www.itgovernance.co.uk

L'auteur - Steve Watkins

Steve Watkins is Corporate Services Manager of HMCPSI and was Head of Quality and Operations at Focus Central London and was, before that, Quality Manager at Business Link. Alan Calder and Steve Watkins were responsible for one of the first companies (BLLCP) to achieve BS 7799 registration when the standard was first promulgated in 1996. They have aided other organizations since then to implement effective information security management systems, and have been involved in the development of both the accredited certification scheme and related training standards.

Sommaire

  • Foreword
  • Introduction
  • Background
  • Why is information security necessary?
  • The Combined Code and the Turnbull Report
  • BS 7799
  • Information security management
  • Information security policy and scope
  • The risk assessment and statement of applicability
  • Security of third party access and outsourcing
  • Asset classification and control
  • Personnel security
  • Physical and environmental security
  • Equipment security
  • General security controls
  • Communications and operations management
  • Controls against malicious software (malware)
  • Housekeeping, network management and media handling
  • Exchanges of information and software
  • E-mail and Internet use
  • Access control
  • Network access control
  • Operating system access control
  • Application access control
  • Mobile computing and teleworking
  • Systems development and maintenance
  • Cryptographic controls
  • Security in development and support processes
  • Business continuity management
  • Compliance
  • The BS 7799 audit
  • Appendix: Sources of further information
  • Index
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Kogan Page
Auteur(s) Alan Calder, Steve Watkins
Parution 15/07/2003
Nb. de pages 342
Format 17,5 x 24,6
Couverture Relié
Poids 800g
Intérieur Noir et Blanc
EAN13 9780749440787

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription