Implementing an information security management system security management based on ISO 27001 guidelines

Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implem...

Full description

Bibliographic Details
Main Authors: Chopra, Abhishek, Chaudhary, Mukund (Author)
Format: eBook
Language:English
Published: [California], New York, NY Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York 2020
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 02896nmm a2200361 u 4500
001 EB001925820
003 EBX01000000000000001088722
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
050 4 |a HF5548.37 
100 1 |a Chopra, Abhishek 
245 0 0 |a Implementing an information security management system  |b security management based on ISO 27001 guidelines  |c Abhishek Chopra, Mukund Chaudhary 
260 |a [California], New York, NY  |b Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York  |c 2020 
300 |a 1 volume  |b illustrations 
505 0 |a Chapter 1 -- Need for information security -- Chapter 2 -- Step 1: Assessing Needs and Scope -- Chapter 3 -- Step 2: Project kick-off -- Chapter 4 -- Step 3: Initial Risk Assessment -- Chapter 5 -- Step 4: Risk Management Approach -- Chapter 6 -- Step 5: Execution -- Chapter 7 -- Step 6: Audit -- Chapter 8 -- Step 7: Management Review -- Chapter 9 -- Step 8: External Audit / Assessment -- Chapter 10 -- Continual Improvement 
505 0 |a Includes bibliographical references 
653 |a Computer security / Management 
653 |a Data protection / Standards 
653 |a Sécurité informatique / Normes 
653 |a Sécurité informatique / Gestion 
653 |a Computer security / Standards / http://id.loc.gov/authorities/subjects/sh99004226 
653 |a Protection de l'information (Informatique) / Normes 
653 |a Computer security / Standards / fast 
653 |a Computer security / Management / fast 
653 |a Data protection / Standards / fast 
700 1 |a Chaudhary, Mukund  |e author 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484254134/?ar  |x Verlag  |3 Volltext 
082 0 |a 658 
082 0 |a 005.8 
520 |a Discover the simple steps to implementing information security standards using ISO 27001, the most popular information security standard across the world. You'll see how it offers best practices to be followed, including the roles of all the stakeholders at the time of security framework implementation, post-implementation, and during monitoring of the implemented controls. Implementing an Information Security Management System provides implementation guidelines for ISO 27001:2013 to protect your information assets and ensure a safer enterprise environment. This book is a step-by-step guide on implementing secure ISMS for your organization. It will change the way you interpret and implement information security in your work area or organization. You will: Discover information safeguard methods Implement end-to-end information security Manage risk associated with information security Prepare for audit with associated roles and responsibilities Identify your information risk Protect your information assets