An Introduction to Information Security and ISO 27001 by Steve G Watkins

By Steve G Watkins

Show description

Read or Download An Introduction to Information Security and ISO 27001 PDF

Best project management books

From Knowledge Management to Strategic Competence: Measuring Technological, Market And Organisational Innovation (Series on Technology Management)

The enterprise and educational groups proceed to be interested within the suggestions of information administration and strategic advantage or middle services. This publication makes an attempt to set up the hyperlinks among strategic talents, wisdom administration, organisational studying and innovation - particularly, how an business enterprise identifies, assesses and exploits its capabilities, and interprets those into new strategies, services.

Successful Project Management (The Sunday Times Creating Success)

Covers the complete venture administration strategy, directing the abilities of retaining a stability among the calls for of the client, undertaking, crew and the association. allows any supervisor to noticeably bring up the chance of luck with their initiatives.

Software Sizing, Estimation, and Risk Management: When Performance is Measured Performance Improves

To accomplish constant software program undertaking good fortune lower than the pressures of trendy software program improvement surroundings, software program firms require achieveable plans together with achievable estimates of agenda, assets, and dangers. To estimate realistically, you need to know how to use sound estimation procedures, instruments, and information.

Strategy and Business Process Management: Techniques for Improving Execution, Adaptability, and Consistency

This publication prepares readers to grasp an IT and managerial self-discipline speedy gaining momentum in organisations of all sizes – company method administration (BPM). It describes how BPM treats approaches as a portfolio of strategic resources that create and convey purchaser and shareholder worth and adapt, whilst important, permitting aggressive virtue via constant functionality.

Additional resources for An Introduction to Information Security and ISO 27001

Sample text

Registrar: Americanism for certification body; see Certification body. * Risk appetite: an organisation’s overall attitude to risk, the balance between risk and return, and the trade-off between security and flexibility, usually a strategic decision by the organisation’s board. * SoA: see Statement of Applicability. ** Third-party certification body: independent organisation with the necessary competence and 43 7: Signposting reliability to award certificates following verification of conformance.

Information assets are likely to be of the following types: 39 7: Signposting x Information: databases and data files, other files and copies of plans, system documentation, original user manuals, original training material, operational or other support procedures, continuity plans, other fall-back arrangements, archived information, financial and accounting information. x Software: application software, operating and system software, development tools and utilities, e-learning assets, network tools and utilities.

Document control: a system whereby all documents within the system have a standard numbering system that identifies where they sit within that system, as well as a version number, an issue date and a document owner, so that the currency of the document is always clear. When a controlled document is amended, all copies of it should be simultaneously withdrawn and replaced by the new version. Encryption: the conversion of plain text into code, using a mathematical algorithm, to prevent it being read by a third party.

Download PDF sample

Rated 4.71 of 5 – based on 48 votes