
It governance
A manager's guide to data security and BS 7799 / ISO 17799
Résumé
The DTI's Information Security Breaches Survey (ISBS) in 2002 showed that the number of organizations suffering a malicious (as distinct from accidental) breach doubled to 44 per cent, in comparison with ISBS 2000. 78 per cent of large businesses suffered at least one malicious security breach and, while the average cost of serious security incidents was £30K, several businesses had incidents that cost more than £500K. With the growing importance of IT to both internal systems and external e-commerce, this may be alarming but perhaps not surprising. What is surprising is that, up until very recently, data security has been seen as the province of the IT department rather than, as it should be, a key board-room issue for the e-commerce age.
The Turnbull report has focused interest in this issue by setting out how directors of listed companies must comply with the UK's Combined Code requirements in respect of internal controls including both financial, risk management and operational - specifically operational from an IT perspective. By underlining the importance of IT Governance as a critical aspect of Corporate Governance the report establishes 'best practice' for any organization both public and private, large and small.
The development of IT Governance - which recognizes the convergence between business management and IT management - makes it essential for managers at all levels of the organization to adopt 'best practice' in information security. By taking on BS 7799 or ISO 17799 organizations can be certain that they are doing this.
This new edition of this important handbook, fully updated with the 2002 version of the BS 7799 standard, will guide managers through the maze of issues involved in effective information security management and show how to introduce reliable management controls. In so doing, it also goes into detail through the process of achieving BS or ISO certification.
It is an essential resource for directors and senior managers in organizations of all sorts and sizes but particularly those with well-developed internal IT systems and those focused on e-commerce.
L'auteur - Alan Calder
L'auteur - Steve Watkins
Sommaire
- Foreword
- Introduction
- Background
- Why is information security necessary?
- The Combined Code and the Turnbull Report
- BS 7799
- Information security management
- Information security policy and scope
- The risk assessment and statement of applicability
- Security of third party access and outsourcing
- Asset classification and control
- Personnel security
- Physical and environmental security
- Equipment security
- General security controls
- Communications and operations management
- Controls against malicious software (malware)
- Housekeeping, network management and media handling
- Exchanges of information and software
- E-mail and Internet use
- Access control
- Network access control
- Operating system access control
- Application access control
- Mobile computing and teleworking
- Systems development and maintenance
- Cryptographic controls
- Security in development and support processes
- Business continuity management
- Compliance
- The BS 7799 audit
- Appendix: Sources of further information
- Index
Caractéristiques techniques
PAPIER | |
Éditeur(s) | Kogan Page |
Auteur(s) | Alan Calder, Steve Watkins |
Parution | 15/07/2003 |
Nb. de pages | 342 |
Format | 17,5 x 24,6 |
Couverture | Relié |
Poids | 800g |
Intérieur | Noir et Blanc |
EAN13 | 9780749440787 |
Avantages Eyrolles.com
Nos clients ont également acheté
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse
- Informatique Informatique d'entreprise Sécurité
- Informatique Réseaux et télecommunications Ouvrages généraux
- Informatique Réseaux et télecommunications Protocoles et standards
- Informatique Réseaux et télecommunications Administration réseau
- Informatique Réseaux et télecommunications Sécurité réseau Sécurité internet