Implementing Information Security based on ISO 27001/ISO 27002
eBook - PDF

Implementing Information Security based on ISO 27001/ISO 27002

  1. English
  2. PDF
  3. Available on iOS & Android
eBook - PDF

Implementing Information Security based on ISO 27001/ISO 27002

About this book

Information is the currency of the information age and in many cases is the most valuable asset possessed by an organisation. Information security management is the discipline that focuses on protecting and securing these assets against the threats of natural disasters, fraud and other criminal activity, user error and system failure. Effective information security can be defined as the 'preservation of confidentiality, integrity and availability of information.' This book describes the approach taken by many organisations to realise these objectives. It discusses how information security cannot be achieved through technological means alone, but should include factors such as the organisation's approach to risk and pragmatic day-to-day business operations. This Management Guide provides an overview of the implementation of an Information Security Management System that conforms to the requirements of ISO/IEC 27001:2005 and which uses controls derived from ISO/IEC 17799:2005. It covers the following: Certification Risk Documentation and Project Management issues Process approach and the PDCA cycle Preparation for an Audit

Frequently asked questions

Yes, you can cancel anytime from the Subscription tab in your account settings on the Perlego website. Your subscription will stay active until the end of your current billing period. Learn how to cancel your subscription.
No, books cannot be downloaded as external files, such as PDFs, for use outside of Perlego. However, you can download books within the Perlego app for offline reading on mobile or tablet. Learn more here.
Perlego offers two plans: Essential and Complete
  • Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
  • Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Both plans are available with monthly, semester, or annual billing cycles.
We are an online textbook subscription service, where you can get access to an entire online library for less than the price of a single book per month. With over 1 million books across 1000+ topics, we’ve got you covered! Learn more here.
Look out for the read-aloud symbol on your next book to see if you can listen to it. The read-aloud tool reads text aloud for you, highlighting the text as it is being read. You can pause it, speed it up and slow it down. Learn more here.
Yes! You can use the Perlego app on both iOS or Android devices to read anytime, anywhere — even offline. Perfect for commutes or when you’re on the go.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Yes, you can access Implementing Information Security based on ISO 27001/ISO 27002 by Alan Calder in PDF and/or ePUB format, as well as other popular books in Education & Architecture General. We have over one million books available in our catalogue for you to explore.

Information

Table of contents

  1. CHAPTER 1 Introduction
  2. CHAPTER 2 Information security and ISO 27001
  3. CHAPTER 3 Certification
  4. CHAPTER 4 ISO 27001 and ISO 27002
  5. CHAPTER 5 Frameworks and management system integration
  6. CHAPTER 6 Documentation requirements and record control
  7. CHAPTER 7 Project team
  8. CHAPTER 8 Project initiation
  9. CHAPTER 9 Process approach and the PDCA cycle
  10. CHAPTER 10 Plan - establish the ISMS
  11. CHAPTER 11 Scope definition
  12. CHAPTER 12 Risk management
  13. CHAPTER 13 Assets within scope
  14. CHAPTER 14 Assessing risk
  15. CHAPTER 15 Risk treatment plan
  16. CHAPTER 16 Risk assessment tools
  17. CHAPTER 17 Statement of Applicability
  18. CHAPTER 18 Third party checklists and resources
  19. CHAPTER 19 Do - implement and operate the ISMS
  20. CHAPTER 20 Check - monitor and review the ISMS
  21. CHAPTER 21 Act - maintain and improve the ISMS
  22. CHAPTER 22 Measurement
  23. CHAPTER 23 Preparing for an ISMS audit