Information Security Risk Management for ISO27001 / ISO27002 (Paperback)
暫譯: ISO27001 / ISO27002 資訊安全風險管理

Alan Calder, Steve G Watkins

  • 出版商: IT Governance Ltd
  • 出版日期: 2010-04-21
  • 售價: $1,890
  • 貴賓價: 9.5$1,796
  • 語言: 英文
  • 頁數: 198
  • 裝訂: Paperback
  • ISBN: 1849280436
  • ISBN-13: 9781849280433
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

相關主題

商品描述

Expert guidance on planning and implementing a risk assessment and protecting your business information. In the knowledge economy, organisations have to be able to protect their information assets. Information security management has, therefore, become a critical corporate discipline. The international code of practice for an information security management system (ISMS) is ISO27002. As the code of practice explains, information security management enables organisations to ensure business continuity, minimise business risk, and maximise return on investments and business opportunities . ISMS requirements The requirements for an ISMS are specified in ISO27001. Under ISO27001, a risk assessment has to be carried out before any controls can be selected and implemented, making risk assessment the core competence of information security management. This book provides information security and risk management teams with detailed, practical guidance on how to develop and implement a risk assessment in line with the requirements of ISO27001. International best practice Drawing on international best practice, including ISO/IEC 27005, NIST SP800-30 and BS7799-3, the book explains in practical detail how to carry out an information security risk assessment. It covers key topics, such as risk scales, threats and vulnerabilities, selection of controls, and roles and responsibilities, and includes advice on choosing risk assessment software. Benefits to business include: * Stop the hacker. With a proper risk assessment, you can select appropriate controls to protect your organisation from hackers, worms and viruses, and other threats that could potentially cripple your business. * Achieve optimum ROI. Failure to invest sufficiently in information security controls is penny wise, pound foolish , since, for a relatively low outlay, it is possible to minimise your organisation s exposure to potentially devastating losses. However, having too many safeguards in place will make information security system expensive and bureaucratic; so without accurate planning your investment in information security controls can become unproductive. With the aid of a methodical risk assessment, you can select and implement your information security controls to ensure that your resources will be allocated to countering the major risks to your organisation. In this way, you will optimise your return on investment. * Build customer confidence. Protecting your information security is essential if you want to preserve the trust of your clients and to keep your business running smoothly from day to day. If you set up an ISMS in line with ISO27001, then, after an assessment, you can obtain certification. Buyers now tend to look for the assurance that can be derived from an accredited certification to ISO27001 and, increasingly, certification to ISO27001 is becoming a prerequisite in service specification procurement documents. * Comply with corporate governance codes. Information security is a vital aspect of enterprise risk management (ERM). An ERM framework is required by various corporate governance codes, such as the Turnbull Guidance contained within the UK s Combined Code on Corporate Governance, and the American Sarbanes-Oxley Act (SOX) of 2002, and standards such as ISO310000. As the authors point out, Just because a threat has not occurred yet does not mean that it never will .

商品描述(中文翻譯)

專家指導風險評估的規劃與實施,以及保護您的商業資訊。在知識經濟中,組織必須能夠保護其資訊資產。因此,資訊安全管理已成為一項關鍵的企業學科。資訊安全管理系統(ISMS)的國際實務準則是ISO27002。正如該準則所解釋的,資訊安全管理使組織能夠確保業務連續性、最小化業務風險並最大化投資回報和商業機會。

ISMS要求
ISMS的要求在ISO27001中有所規定。根據ISO27001,在選擇和實施任何控制措施之前,必須進行風險評估,這使得風險評估成為資訊安全管理的核心能力。本書為資訊安全和風險管理團隊提供了詳細的實用指導,說明如何根據ISO27001的要求開發和實施風險評估。

國際最佳實踐
本書借鑒了國際最佳實踐,包括ISO/IEC 27005、NIST SP800-30和BS7799-3,詳細說明了如何進行資訊安全風險評估。它涵蓋了關鍵主題,如風險評估標準、威脅和漏洞、控制措施的選擇以及角色和責任,並包括選擇風險評估軟體的建議。

對企業的好處包括:
* 阻止駭客。透過適當的風險評估,您可以選擇合適的控制措施來保護您的組織免受駭客、蠕蟲和病毒以及其他可能使您的業務陷入困境的威脅。
* 實現最佳投資回報。未能在資訊安全控制上進行足夠的投資是得不償失的,因為以相對較低的支出,可以最小化組織面臨的潛在重大損失。然而,過多的保護措施會使資訊安全系統變得昂貴且官僚化;因此,沒有準確的規劃,您在資訊安全控制上的投資可能會變得無效。借助系統化的風險評估,您可以選擇和實施資訊安全控制,確保您的資源將分配給應對組織的主要風險。這樣,您將優化投資回報。
* 建立客戶信心。如果您希望保持客戶的信任並使業務日常運行順利,保護您的資訊安全至關重要。如果您根據ISO27001建立ISMS,那麼在評估後,您可以獲得認證。買家現在傾向於尋求來自ISO27001認證的保證,越來越多的情況下,ISO27001的認證已成為服務規範採購文件中的先決條件。
* 遵守企業治理準則。資訊安全是企業風險管理(ERM)的重要方面。各種企業治理準則要求建立ERM框架,例如英國《企業治理綜合法典》中的Turnbull指導原則,以及2002年的美國《薩班斯-奧克斯利法案》(SOX)和ISO310000等標準。正如作者所指出的,「僅僅因為威脅尚未發生,並不意味著它永遠不會發生。」