Information Security GovernanceIT Security governance is becoming an increasingly important issue for all levels of a company. IT systems are continuously exposed to a wide range of threats, which can result in huge risks that threaten to compromise the confidentiality, integrity, and availability of information. This book will be of use to those studying information security, as well as those in industry. Key Features:
|
What people are saying - Write a review
Reviews aren't verified, but Google checks for and removes fake content when it's identified
User Review - Flag as inappropriate
Very good book, explains concepts very clearly
Contents
An Introduction to Corporate Governance | 1 |
Information Technology Governance | 9 |
Information Security and Information Security Governance | 17 |
Introducing the Information Security Governance Model | 29 |
The Use of Best Practice Standards and Guidelines in Information Security Governance | 39 |
The Direct Part of the Model An Information Security Policy Architecture | 61 |
The Control Part of the Model An Information Security Compliance Management Environment | 73 |
Other editions - View all
Common terms and phrases
accepted actions activities approach aspects assets Audit authorized Available aware become Best Practice Board changes Chapter choosing CISP COBIT company’s Compliance Clause Compliance Management component concerned consists continuity Control Corporate Governance create cycle defined detail determine dimensions Direct discussed document effective electronic employees enforcement ensure environment essential evaluate example Executive Management exist formal framework function guidelines identified impact implement important indicated Information Security Governance Information Security Management Information Security Policy integrity International Internet introduced involved means measures mentioned Model monitoring needs objective Operational organization organizational Paragraph password possible probability procedures proper protection reference relevant responsibilities result Risk Management seen Service Solms specific standards Statement Step Strategic structure technical Technology threat tion users vulnerability