Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
4,729
result(s) for
"Data protection Standards."
Sort by:
Information Security Breaches
2009,2014,2008
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
PCI DSS: A Practical Guide to Implementing and Maintaining Compliance
2011
The objective of this revised practical guide is to give entities advice and tips on the entire PCI implementation process. It provides a roadmap, helping entities to navigate the broad, and sometimes confusing, PCI DSS v2, and shows them how to build and maintain a sustainable PCI compliance programme. This latest revision also includes increased guidance on how to ensure your compliance programme is ‘sustainable’ and has been based on real-life scenarios, which should help to ensure your PCI compliance programme remains compliant. Although the guide starts with sections on why and what is PCI, it is not intended to replace the ‘publicly available’ PCI information. This book looks to serve those who have been given the responsibility of PCI, and does not attempt to provide all the answers. It should be read, absorbed and digested only with a good helping of other PCI ‘publicly available’ information. In other words, it will help an organisation or individual, get started, and hopefully furnish the reader with enough of the fundamental basics to create, design and build the organisation’s own PCI compliance framework.
ISO27001/ISO27002
Questa indispensabile guida tascabile fornisce un'utile panoramica di due importanti norme sulla sicurezza delle informazioni Così ricco di consigli pratici per l'attuazione di un sistema di gestione della sicurezza delle informazioni che vi chiederete come avete potuto farne a meno prima d'ora. Acquista la tua copia oggi stesso.
Security without Obscurity
The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field has become more complex, novices and professionals need a reliable reference that outlines the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, it provides an understanding of how to approach information security from the bedrock principles of confidentiality, integrity, and authentication.
ISO27001 / ISO27002
by
ALAN CALDER
in
Business enterprises-Computer networks-Security measures
,
Computer security
,
Data protection
2013
Information is one of your organisation’s most important resources. Keeping it secure is therefore vital to your business. This handy pocket guide is an essential overview of two key information security standards that cover the formal requirements (ISO27001:2013) for creating an Information Security Management System (ISMS), and the best-practice recommendations (ISO27002:2013) for those responsible for initiating, implementing or maintaining it.
PCI Compliance
by
Williams, Branden R
,
Chuvakin, Stony Brook University
in
Computer networks
,
Credit cards
,
Data protection
2014,2015
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime.In particular, credit card data is preferred by cybercriminals.Is your payment processing secure and compliant?.
ISO27001/ISO27002
2017
Dieser unverzichtbare Taschenführer bietet einen hilfreichen Überblick über zwei wichtige Informationssicherheitsstandards. Voll gepackt mit praktischen Tipps zur Implementierung eines Informationssicherheit-Managementsystems, werden Sie sich schnell fragen, wie Sie bislang ohne ausgekommen sind. Sichern Sie sich Ihr Exemplar noch heute.
Data Protection by Design Tool for Automated GDPR Compliance Verification Based on Semantically Modeled Informed Consent
by
Chhetri, Tek Raj
,
DeLong, Rance J.
,
Fensel, Anna
in
Automation
,
Compliance
,
compliance verification
2022
The enforcement of the GDPR in May 2018 has led to a paradigm shift in data protection. Organizations face significant challenges, such as demonstrating compliance (or auditability) and automated compliance verification due to the complex and dynamic nature of consent, as well as the scale at which compliance verification must be performed. Furthermore, the GDPR’s promotion of data protection by design and industrial interoperability requirements has created new technical challenges, as they require significant changes in the design and implementation of systems that handle personal data. We present a scalable data protection by design tool for automated compliance verification and auditability based on informed consent that is modeled with a knowledge graph. Automated compliance verification is made possible by implementing a regulation-to-code process that translates GDPR regulations into well-defined technical and organizational measures and, ultimately, software code. We demonstrate the effectiveness of the tool in the insurance and smart cities domains. We highlight ways in which our tool can be adapted to other domains.
Journal Article
Nueve pasos para el éxito
by
Calder, Alan
in
COM053000 COMPUTERS / Security / General
,
Computer security-Management
,
Computer security-Standards
2017
Orientación paso a paso sobre la implementación de la ISO 27001 con éxito
En lenguaje sencillo y nada técnico, esta guía le llevará por los pasos clave de un proyecto de la ISO 27001 para asegurar su éxito, desde el comienzo a la certificación:
Encargo del proyectoInicio del proyectoInicio del SGSIMarco de la gestiónCriterios de seguridad de referenciaGestión del riesgoImplementaciónMedición, monitorización y revisiónCertificación
Ahora en esta tercera edición y alineada con la ISO 27001:2013, esta guía es ideal para cualquiera que emprenda la norma por primera vez.
\"Es como tener un consultor de $300/h codo con codo mientras considera los aspectos de obtener apoyo de la gerencia, la planificación, el alcance, la comunicación, etc.\"
Thomas F. Witwicki
Con este libro, averiguará cómo:
Conseguir apoyo de la gerenciay mantener la atención del consejo;Crear un marco de gestióny realizar un análisis de las deficiencias, para que pueda entender claramente los controles que ya tiene implantados e identificar dónde tiene que centrar sus esfuerzos;Estructurar y conseguir recursos para su proyecto, incluido le asesoramiento sobre si utilizar consultores o hacerlo usted mismo, y un examen de las herramientas y recursos disponibles que harán su trabajo más fácil;Llevar a cabo una evaluación del riesgo en cinco pasos, y crear una Declaración de aplicabilidad y un plan de tratamiento del riesgo;Integrarsu SGSI de la ISO 27001 con un SGC de la ISO 9001 y otros sistemas de calidad;Abordar los retos de la documentaciónque afrontará cuando cree políticas empresariales, procedimientos, instrucciones de trabajo y registros, incluidas alternativas viables para un enfoque de prueba y error costoso;Mejorar continuamente su SGSI, incluida la auditoría y prueba internas, y la revisión gerencial;
Este título le dará la orientación que necesita para entender los requisitos de la norma y asegurarse de que su proyecto de implementación sea un éxito, lo cual incluye losseis secretos para un éxito de certificación.
Experiencia
Lograr y mantener una certificación acreditada con la ISO 27001, la norma internacional que expone los requisitos de un SGSI, puede ser una tarea complicada, especialmente para los implementadores que sean nuevos con la norma.
El autor, Alan Calder, conoce la ISO 27001 al derecho y al revés: es el fundador y presidente ejecutivo de IT Governance, y dirigió la implementación del primer sistema de gestión en lograr una certificación acreditada con la BS 7799, la precursora de la ISO 27001, y ha estado trabajando con la norma y sus sucesoras desde entonces.
Cientos de organizaciones en todo el mundo han logrado una certificación acreditada con la ISO 27001 con la orientación de IT Governance, que está condensada en este libro.
Compre este libro hoy y aprenda los nueve pasos esenciales para una implementación con éxito del SGSI de la ISO 27001.