Download e-book for kindle: An Introduction to Information Security and ISO 27001 by Steve G Watkins

By Steve G Watkins

ISBN-10: 1905356692

ISBN-13: 9781905356690

Show description

Read or Download An Introduction to Information Security and ISO 27001 PDF

Similar project management books

Get Handbook on International Corporate Governance PDF

This significant new guide offers a finished research of the improvement of company governance throughout various international locations together with Australia, Germany, India, Italy, Japan, Poland, Russia, South Africa, Spain, Turkey and the united kingdom. whereas the level within the company governance lifestyles cycle might fluctuate from state to kingdom, there are particular middle beneficial properties which emerge corresponding to the significance of transparency, disclosure, responsibility of administrators and defense of minority shareholders’ rights.

Download PDF by Jessica Keyes: Implementing the Project Management Balanced Scorecard

Company managers have lengthy recognized the ability of the Balanced Scorecard in executing company technique. imposing the undertaking administration Balanced Scorecard indicates venture managers how they can also use this framework to satisfy strategic goals. It offers precious perception into the undertaking administration procedure as a complete and gives certain reasons on the way to successfully enforce the balanced scorecard to degree and deal with functionality and initiatives.

Gail Levitt's Team Planning for Project Managers and Business Analysts PDF

Providing busy venture execs with time-tested counsel and templates for constructing groups successfully and successfully, staff making plans for venture Managers and enterprise Analysts offers the making plans fabrics required to extend group collaboration and productiveness in a world office. This complete source bargains insights and entry to serious assets and instruments to create, suggest, execute, and evaluation crew improvement plans.

Extra info for An Introduction to Information Security and ISO 27001

Sample text

Occasionally there will be technological developments that introduce risks which are not covered to a suitable extent by the existing controls, and so it may be necessary to adopt additional controls. In the standards there are over 130 controls split into 11 categories, but for the purpose of familiarisation here we are considering them in six groups, and not in any detail. The six groups are not themselves significant and they could easily be formed differently. Organisation, structure and human resources This list includes the main controls off which the rest of the system hangs.

35 CHAPTER 6: CERTIFICATION As with many other management system standards, there is a scheme that can be used by organisations to demonstrate their compliance with the internationally recognised standard for information security management, ISO27001. Companies wishing to use this standard to demonstrate the robustness of their information security management arrangements need to subject themselves to an external audit. For the assurance provided by the outcome of the audit to be recognised, the audit needs to be conducted in compliance with the recognised scheme; that is, the ‘accredited certification scheme’.

The schedule can include checks to confirm that only the right, approved equipment is connected to the network, that systems and software are as required (the approved mix and number for the licences held), and can include penetration testing to confirm the resilience of the technical measures in place. 35 CHAPTER 6: CERTIFICATION As with many other management system standards, there is a scheme that can be used by organisations to demonstrate their compliance with the internationally recognised standard for information security management, ISO27001.

Download PDF sample

An Introduction to Information Security and ISO 27001 by Steve G Watkins


by Steven
4.3

Rated 4.19 of 5 – based on 48 votes