Managing Information Security Studies from real life
A comprehensive guide to managing an information security incident Even when organisations take precautions, they may still be at risk of a data breach. Information security incidents do not just affect small businesses: major companies and government departments suffer from them as well. Completel...
Corporate Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | Inglés |
Published: |
IT Governance Publishing
2015.
|
Edition: | 2nd edition |
Subjects: | |
See on Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009630028406719 |
Table of Contents:
- Intro
- Foreword
- Preface
- About the Author
- Acknowledgements
- Contents
- Introduction
- Part 1 - General
- Chapter 1: Why Risk does Not Depend on Company Size
- Risk effect
- Propagation of damage (downstream effects)
- Culture
- Information security staff
- Cash reserves / cash at hand
- Ability to improvise / make quick decisions
- Preparedness
- Contacts with authority
- Chapter 2: Getting your Risk Profile Right
- Intuitive risk analysis
- Formal risk analysis
- Step 1 - Identifying threats
- Step 2 - Assigning damage and likelihood
- Step 3 - Defining acceptable loss
- Step 4 - Defining mitigation priorities (business priorities)
- Residual risks
- Chapter 3: What is a Breach?
- Confidentiality breach
- Availability breach
- Integrity breach
- Impact
- Source
- External vs. internal
- Unintentional vs. intentional
- Manual vs. automatic
- Human vs. nature
- General treatment options
- Chapter 4: General Avoidance and Mitigation Strategies
- Introduction - general aspects, avoidance and related ISO27001 controls
- People
- A.7.1.1 - Screening
- Methods of screening
- A.7.1.2 - Terms and conditions of employment
- A.7.2.1 - Management responsibilities
- A.7.2.2 - Information security awareness, education and training
- A.7.2.3 - Disciplinary process
- A.7.3.1 - Termination or change of employment
- A.8.1.4 - Return of assets
- A.9.2.6 - Removal or adjustment of access rights
- Processes
- Technology
- ISO27001 Controls helpful for treatment of breaches
- A.6.1.3 - Contact with authorities
- A.7.2.2 - Information security awareness, education and training
- A.7.2.3 - Disciplinary process A.8.1.4 - Return of assets A.9.2.6 - Removal or adjustment of access rights
- A.12.2.1 - Controls against malware
- A.12.4.1 - Event logging and
- A.12.4.2 - Protection of log information.
- A.16.1.1 - Responsibilities and procedures
- A.16.1.2 - Reporting information security events
- A.16.1.3 - Reporting security weaknesses
- A.16.1.4 - Assessment of and decision on information security events
- A.16.1.5 - Response to information security incidents
- A.16.1.6 - Learning from information security incidents
- A.16.1.7 - Collection of evidence
- Strategies and tactics for treating breaches
- Tactical advice
- Regular meetings
- Time, time, time
- Rest
- People (number)
- International contacts
- Keep the information flowing
- Keep minutes
- Additional quality feedback
- Dimensions of treatment / mitigation of information security breaches
- None
- Internal investigation
- External investigation
- Joint task force
- Part 2 - Case studies
- Chapter 5: Notes from the Field
- Privacy
- Cost
- The practicalities of surveillance
- People
- Cost
- Speed
- Outreach
- The truth vs. company policy
- Chapter 6: Motives and Reasons
- Greed
- Despair
- Revenge
- Business advantage
- Chapter 7: Case Studies from Small Companies
- Foreword to the case studies
- The stolen backup
- In-depth explanation
- Lessons learned
- Eavesdropping on faxes
- In-depth explanation
- A stolen laptop
- In-depth explanation
- Chapter 8: Case Studies from Medium-sized Companies
- A case of intrigue - the missing contract
- In-depth explanation
- Lessons learned
- The sales manager who changed jobs
- In-depth explanation
- Lessons learned
- The project manager who became a friend, and then an enemy
- In-depth explanation
- The lost customers - how a sales manager cost a company 10% of revenue
- In-depth explanation
- Lessons learned
- The flood - how not to learn about risk management
- In-depth explanation
- Chapter 9: Case Studies from Large Corporations
- Who wants my data? - a case of data theft.
- In-depth explanation
- Lessons learned
- Who wants my data? - a more complicated case
- In-depth explanation
- Hard disk for sale - beware of your contractors
- In-depth explanation
- Unauthorised domain links - it is easy to harm a company's reputation
- In-depth explanation
- The trusted guard who was not
- In-depth explanation
- Insider badmouthing
- In-depth explanation
- The software vulnerability that was not - a case of blackmail
- In-depth explanation
- Lessons learned
- Part 3 - A Sample Treatment Process
- Chapter 10: A Sample Treatment Process
- Step 1 Gather information
- Step 2 Determine extent and damage
- Step 3 Establish and conduct investigation
- Step 4 Determine mitigation
- Step 5 Implement mitigation
- Step 6 Follow up on investigation results
- Step 7 Determine degree of resolution achieved
- Abbreviations and Acronyms
- ITG Resources.