2009

Information Security Governance

Authors:

ISBN: 978-0-387-79983-4 (Print) 978-0-387-79984-1 (Online)

Table of contents (13 chapters)

  1. Front Matter

    Pages 1-12

  2. No Access

    Book Chapter

    Pages 1-7

    An Introduction to Corporate Governance

  3. No Access

    Book Chapter

    Pages 1-7

    Information Technology Governance

  4. No Access

    Book Chapter

    Pages 1-11

    Information Security and Information Security Governance

  5. No Access

    Book Chapter

    Pages 1-10

    Introducing the Information Security Governance Model

  6. No Access

    Book Chapter

    Pages 1-21

    The Use of Best Practice Standards and Guidelines in Information Security Governance

  7. No Access

    Book Chapter

    Pages 1-12

    The Direct Part of the Model – An Information Security Policy Architecture

  8. No Access

    Book Chapter

    Pages 1-13

    The Control Part of the Model – An Information Security Compliance Management Environment

  9. No Access

    Book Chapter

    Pages 1-14

    IT Risk Management

  10. No Access

    Book Chapter

    Pages 1-11

    Organizing the Information Security Function

  11. No Access

    Book Chapter

    Pages 1-14

    Information Security Education, Training and Awareness

  12. No Access

    Book Chapter

    Pages 1-4

    A Methodology for Establishing an Information Security Governance Environment

  13. Back Matter

    Pages 1-4