PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
2015 | t. 16, z. 6, cz. 1 Zarządzanie wybranymi podmiotami bezpieczeństwa w Rzeczpospolitej Polskiej | 173--184
Tytuł artykułu

Basic Principles of Information Security Management and Costs of Information Security Breaches

Autorzy
Treść / Zawartość
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
The issue of the information safety management was characterized. The importance and the role of information was defined. The approach of organizational units to the process of establishment of the safety management information system was presented. It was shown that enterprises prefer savings over the safety of information and they often make investments in a situation when the information is already lost or another incident occurred that adversely affected their operation. Presents the costs and consequences of information security breaches.(original abstract)
Twórcy
  • Społeczna Akademia Nauk
Bibliografia
  • Gierszewska G., Romanowska M., (1997), Strategic analysis of the company, Warsaw. Harold F., Crause T.M., Information security management handbook, fifth edition, CRC Press, 2003.
  • Harris S. (2009) CISSP All -in -one Exam Guide Fifth Edition, Mc Graw Hill, New York.
  • Kumaniecki K. (1996), Dictionary Latin - Polish, Warsaw.
  • Mashable (2012), How much does identity theft cost?, 28 January 2011, www.mashable. com , 20.12.2014.
  • Ponemon Institute LLC (2012), See 2012 cost of cyber crime study: US by Ponemon Institute, Executive Summary, USA (www.slideshare.net).
  • Ponemon Institute LLC (2013), Cost of Data Breach Study: Global Analysis Benchmark research sponsored by Symantec Independently Conducted by Ponemon Institute LLC, USA www.slideshare.net).
  • Ponemon Institute LLC (2014), Cost of Data Breach Study: Global Analysis Benchmark research sponsored by IBM Independently conducted by Ponemon Institute LLC, USA (www. slideshare.net).
  • Reuters (2012), Identity Theft Cost Americans $1.52B in 2011, 28 February 2012, (www. huffingtonpost.com).
  • Singleton T. (2013), The core of IT audit, ISACA Journal, volume 5, USA.
  • Singleton T. (2014), Risk to entities regarding data breaches lesson from a brief case study, ISACA Journal, Volume 2, USA.
  • Symantec (2013), The Norton Report by Symantec 2013, www.symantec.com
  • Volchkov A. (2013), How to measure security from a governance perspective, ISACA Journal, volume 5, USA.
  • Verizon (2012), Data breach Investigations Report, www.verizonenterprise.com.
  • Vimal Mani (2014), Aligning Information Security with enterprise risk management using ISO/IEC 27001:2013, Journal, volume 2, USA.
  • ISO/IEC 27002:2005, Information technology - Security techniques - Code of practice for information security management.
  • ISO/IEC 27001:2013, Information technology - Security techniques - Information security management systems - Requirements.
  • www.cricpa.com
  • www.isaca.org
Typ dokumentu
Bibliografia
Identyfikatory
Identyfikator YADDA
bwmeta1.element.ekon-element-000171407471

Zgłoszenie zostało wysłane

Zgłoszenie zostało wysłane

Musisz być zalogowany aby pisać komentarze.
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.