You are previewing Information Security Breaches: Avoidance and Treatment based on ISO27001.
O'Reilly logo
Information Security Breaches: Avoidance and Treatment based on ISO27001

Book Description

There are lots of books that will tell you what to do to prevent an information security breach. This book is different. It tells you what you have to do if a security breach occurs.

Table of Contents

  1. Copyright
  2. Foreword
  3. Preface
  4. About the Author
  5. Acknowledgements
  6. Introduction
  7. 1. What Constitutes a Breach?
    1. Information security incident
    2. A single or a series...
    3. ... ...significant probability of compromising...
    4. Confidentiality breach
    5. Availability breach
    6. Integrity breach
    7. Impact
    8. Source
      1. External vs. internal
      2. Unintentional vs. intentional
      3. Manual vs. automatic
      4. Human vs. Nature
    9. General treatment options
      1. None
      2. Internal investigation
      3. External investigation
      4. Joint task force
  8. 2. Treatment Using ISO27001
    1. Assess the damage
    2. Past or future?
    3. Initiate an investigation, secure all evidence
    4. Evaluate evidence
    5. Draft the report
    6. Final decision
    7. Follow up with tenacity
    8. Review
    9. How ISO27001 supports the treatment of breaches
      1. A.6.1.6 – Contact with authorities
      2. A.8.2.2 – Information security awareness, education and training
      3. A.8.2.3 – Disciplinary process
      4. A.8.3.2 – Return of assets
      5. A.8.3.3 – Removal of access rights
      6. A.10.4.1 – Controls against malicious code
      7. A.10.10.1 – Audit logging
      8. A.10.10.3 – Protection of log information
      9. A.12.5.4 – Information leakage
      10. A.13.1.1 – Reporting information security events
      11. A.13.1.2 – Reporting security weaknesses
      12. A.13.2.1 – Responsibilities and procedures
      13. A.13.2.2 – Learning from information security incidents
      14. A.13.2.3 – Collection of evidence
      15. 4.2.1. c–f – Defining the risk assessment approach of the organisation
  9. 3. Case Studies
    1. Case study 1 – small company
      1. Lessons learned
    2. Case study 2 – small company
      1. Lessons learned
    3. Case study 3 – medium-sized company
      1. Lessons learned
    4. Case study 4 – large company
      1. Lessons learned
  10. ITG Resources
    1. Other Websites
    2. Pocket Guides
    3. Toolkits
    4. Best Practice Reports
    5. Training and Consultancy
    6. Newsletter