Introduction

Breaches of information security are not a new phenomenon, but the means of perpetrating such breaches have changed considerably over the years. Leaking information has always been an issue, but the speed and effectiveness with which breaches of information security can occur, and the potential magnitude of harm caused in today’s computer age, are disturbing and, moreover, typically favour the perpetrator, not the victim.

Bearing in mind the dependency of modern companies on their IT systems, it is clear that special care needs to be taken to keep systems safe and secure. This book focuses solely on the aspects of re-establishing safety and security once, despite all measures taken, a breach has occurred. It puts breaches of information ...

Get Managing Information Security Breaches: Studies from Real Life now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.