Coverart for item
The Resource How to achieve 27001 certification : an example of applied compliance management, Sigurjon Thor Arnason, Keith D. Willett

How to achieve 27001 certification : an example of applied compliance management, Sigurjon Thor Arnason, Keith D. Willett

Label
How to achieve 27001 certification : an example of applied compliance management
Title
How to achieve 27001 certification
Title remainder
an example of applied compliance management
Statement of responsibility
Sigurjon Thor Arnason, Keith D. Willett
Creator
Contributor
Subject
Genre
Language
eng
http://library.link/vocab/creatorName
Arnason, Sigurjon Thor
Dewey number
005.8
Illustrations
illustrations
Index
index present
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Willett, Keith D
http://library.link/vocab/subjectName
  • Electronic data processing personnel
  • Computer security
Label
How to achieve 27001 certification : an example of applied compliance management, Sigurjon Thor Arnason, Keith D. Willett
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Color
other
Contents
INTRODUCTION <BR>ISO SECURITY STANDARDS<BR>INTERNATIONAL SECURITY ORGANIZATION (ISO) SECURITY STANDARD CERTIFICATION <BR>GOALS<BR>OUTLINE AND FLOW <BR>COMMENTARY <BR><BR>INTRODUCTION TO ISO SECURITY STANDARDS <BR>OBJECTIVES <BR>CORNERSTONES OF INFORMATION SECURITY <BR>THE HISTORY OF ISO INFORMATION SECURITY STANDARDS<BR>INFORMATION SECURITY STANDARDS ROADMAP AND <BR> NUMBERING<BR>INTERNATIONAL SECURITY MANAGEMENT STANDARDS<BR>OTHER PROPOSED INFORMATION SECURITY STANDARDS<BR>INTRODUCTION TO THE ISO/IEC 27001 STANDARD<BR>INTRODUCTION TO THE ISO 17799 STANDARD<BR>RELATIONSHIP BETWEEN ISO 27001 AND THE ISO 17799<BR>RELATIONSHIP TO OTHER MANAGEMENT STANDARDS<BR>PDCA AND SECURITY STANDARDS CROSS REFERENCE<BR><BR>INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) <BR>OBJECTIVES<BR>ISMS INTRODUCTION<BR>SECURITY MANAGEMENT FRAMEWORK (SMF) <BR> INTRODUCTION<BR>ISMS ESTABLISHMENT PROCESS...TO-BE OR PDCA<BR><BR>FOUNDATIONAL CONCEPTS AND TOOLS FOR AN ISMS <BR>OBJECTIVES<BR>SMF APPLICATIONS<BR>ISMS INITIAL PLANNING AND IMPLEMENTATION<BR>ESTABLISHING CURRENT STATUS OF ORGANIZATIONAL SECURITY MANAGEMENT (ASSESSMENT PROCESS) <BR>ANALYSIS OF DISCOVERY RESULTS<BR>AN INITIAL VIEW OF DEVELOPING AN ISMS<BR><BR>IMPLEMENTING AN INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) -- PDCA <BR>OBJECTIVES<BR>ISMS DEFINITION<BR>PDCA MODEL<BR>PLAN PHASE<BR>DO PHASE<BR>CHECK PHASE<BR>ACT PHASE<BR>SUMMARY OF IMPLEMENTING THE ISMS<BR><BR>AUDIT AND CERTIFICATION<BR>OBJECTIVES<BR>CERTIFICATION PROCESS OVERVIEW<BR>SELECTING AN ACCREDITED CERTIFICATION BODY<BR>CERTIFICATION PREPARATION CHECKLIST<BR>THE AUDIT STAGE PROCESS<BR><BR>COMPLIANCE MANAGEMENT<BR>OBJECTIVES<BR>INTRODUCTION TO COMPLIANCE MANAGEMENT<BR>IA COMPLIANCE MANAGEMENT PROGRAM<BR>CONCLUSION AND COMMENTARY<BR><BR>APPENDIX A: ISMS ASSESSMENT DISCOVERY QUESTION SET<BR><BR>APPENDIX B: SAMPLE STATEMENT OF APPLICABILITY (SOA) <BR><BR>APPENDIX C: PDCA GUIDELINE DOCUMENTS -- OUTLINES <BR>ISMS -- PLAN PHASE GUIDELINES-DOCUMENT OUTLINE<BR>ISMS -- DO PHASE GUIDELINES-DOCUMENT OUTLINE<BR>ISMS -- CHECK PHASE GUIDELINES-DOCUMENT OUTLINE<BR>ISMS -- ACT PHASE GUIDELINES-DOCUMENT OUTLINE<BR><BR>APPENDIX D: POLICY, STANDARD, AND PROCEDURE SAMPLE TEMPLATES<BR>SAMPLE POLICY TEMPLATE<BR>SAMPLE STANDARD TEMPLATE<BR>SAMPLE PROCEDURE TEMPLATE<BR><BR>APPENDIX E: ISMS POLICY AND RISK TREATMENT TEMPLATES<BR>ISMS POLICY TEMPLATE <BR>RISK TREATMENT TEMPLATE <BR><BR>APPENDIX F: PROJECT DEFINITION TEMPLATE<BR><BR>USEFUL BITS OF KNOWLEDGE (UBOKS) <BR><BR>GLOSSARY<BR><BR>REFERENCES<BR><BR>INDEX
Control code
ocn268619339
Dimensions
unknown
Extent
1 online resource (xx, 326 pages)
Form of item
online
Isbn
9781420013139
Note
Taylor & Francis
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)268619339
Label
How to achieve 27001 certification : an example of applied compliance management, Sigurjon Thor Arnason, Keith D. Willett
Publication
Bibliography note
Includes bibliographical references and index
Color
other
Contents
INTRODUCTION <BR>ISO SECURITY STANDARDS<BR>INTERNATIONAL SECURITY ORGANIZATION (ISO) SECURITY STANDARD CERTIFICATION <BR>GOALS<BR>OUTLINE AND FLOW <BR>COMMENTARY <BR><BR>INTRODUCTION TO ISO SECURITY STANDARDS <BR>OBJECTIVES <BR>CORNERSTONES OF INFORMATION SECURITY <BR>THE HISTORY OF ISO INFORMATION SECURITY STANDARDS<BR>INFORMATION SECURITY STANDARDS ROADMAP AND <BR> NUMBERING<BR>INTERNATIONAL SECURITY MANAGEMENT STANDARDS<BR>OTHER PROPOSED INFORMATION SECURITY STANDARDS<BR>INTRODUCTION TO THE ISO/IEC 27001 STANDARD<BR>INTRODUCTION TO THE ISO 17799 STANDARD<BR>RELATIONSHIP BETWEEN ISO 27001 AND THE ISO 17799<BR>RELATIONSHIP TO OTHER MANAGEMENT STANDARDS<BR>PDCA AND SECURITY STANDARDS CROSS REFERENCE<BR><BR>INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) <BR>OBJECTIVES<BR>ISMS INTRODUCTION<BR>SECURITY MANAGEMENT FRAMEWORK (SMF) <BR> INTRODUCTION<BR>ISMS ESTABLISHMENT PROCESS...TO-BE OR PDCA<BR><BR>FOUNDATIONAL CONCEPTS AND TOOLS FOR AN ISMS <BR>OBJECTIVES<BR>SMF APPLICATIONS<BR>ISMS INITIAL PLANNING AND IMPLEMENTATION<BR>ESTABLISHING CURRENT STATUS OF ORGANIZATIONAL SECURITY MANAGEMENT (ASSESSMENT PROCESS) <BR>ANALYSIS OF DISCOVERY RESULTS<BR>AN INITIAL VIEW OF DEVELOPING AN ISMS<BR><BR>IMPLEMENTING AN INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) -- PDCA <BR>OBJECTIVES<BR>ISMS DEFINITION<BR>PDCA MODEL<BR>PLAN PHASE<BR>DO PHASE<BR>CHECK PHASE<BR>ACT PHASE<BR>SUMMARY OF IMPLEMENTING THE ISMS<BR><BR>AUDIT AND CERTIFICATION<BR>OBJECTIVES<BR>CERTIFICATION PROCESS OVERVIEW<BR>SELECTING AN ACCREDITED CERTIFICATION BODY<BR>CERTIFICATION PREPARATION CHECKLIST<BR>THE AUDIT STAGE PROCESS<BR><BR>COMPLIANCE MANAGEMENT<BR>OBJECTIVES<BR>INTRODUCTION TO COMPLIANCE MANAGEMENT<BR>IA COMPLIANCE MANAGEMENT PROGRAM<BR>CONCLUSION AND COMMENTARY<BR><BR>APPENDIX A: ISMS ASSESSMENT DISCOVERY QUESTION SET<BR><BR>APPENDIX B: SAMPLE STATEMENT OF APPLICABILITY (SOA) <BR><BR>APPENDIX C: PDCA GUIDELINE DOCUMENTS -- OUTLINES <BR>ISMS -- PLAN PHASE GUIDELINES-DOCUMENT OUTLINE<BR>ISMS -- DO PHASE GUIDELINES-DOCUMENT OUTLINE<BR>ISMS -- CHECK PHASE GUIDELINES-DOCUMENT OUTLINE<BR>ISMS -- ACT PHASE GUIDELINES-DOCUMENT OUTLINE<BR><BR>APPENDIX D: POLICY, STANDARD, AND PROCEDURE SAMPLE TEMPLATES<BR>SAMPLE POLICY TEMPLATE<BR>SAMPLE STANDARD TEMPLATE<BR>SAMPLE PROCEDURE TEMPLATE<BR><BR>APPENDIX E: ISMS POLICY AND RISK TREATMENT TEMPLATES<BR>ISMS POLICY TEMPLATE <BR>RISK TREATMENT TEMPLATE <BR><BR>APPENDIX F: PROJECT DEFINITION TEMPLATE<BR><BR>USEFUL BITS OF KNOWLEDGE (UBOKS) <BR><BR>GLOSSARY<BR><BR>REFERENCES<BR><BR>INDEX
Control code
ocn268619339
Dimensions
unknown
Extent
1 online resource (xx, 326 pages)
Form of item
online
Isbn
9781420013139
Note
Taylor & Francis
Other physical details
illustrations
Specific material designation
remote
System control number
(OCoLC)268619339

Library Locations

    • InternetBorrow it
      Albany, Auckland, 0632, NZ
Processing Feedback ...