TY - BOOK AU - Landtsheer,Christophe de AU - Matthys,Eugeen A. TI - Business continuity management: A practical guide to BS25999 and Information Security Management SN - 97879081369404 U1 - 658.15 15 PY - 2010/// CY - London PB - Retiarius Press KW - Business KW - Management KW - International finance KW - Information resources management KW - Security N1 - Includes glossary; The reading of this book is supported by a complementary access to a BS25999 complaint Software-as-a-Service (SaaS) application; Pt. 1. Business Continuity Management -- 1. What is BCM? -- 2. Why implement a formal BC process? -- 3. How to operate a formal BC process? -- 4. How to implement a BC process? -- 5. The Benefits of a BCM software solution -- 6. What does a good BCM software solution look like? -- Pt. 2.Information security -- 1. Introduction -- 2. Risk assessment -- 3. Laws and regulations -- 4. User authentication -- 5. Security Policy awareness -- 6. Patch Management -- 7. Windows Desktop security -- 8. Server security -- 9. Firewall protection -- 10. Web site protection -- 11. Wireless Networks -- 12. Intrusion testing -- 13. Security through Obscurity -- 14. Windows Operating System -- 15. Electronic Mail -- 16. About Spam -- 17. Viruses -- 18. Malware/Spyware/Adware -- 19. Digital rights -- 20. File sharing -- 21. Data archives and backup -- 22. Internet misuse -- 23. Document security -- 24. Data theft -- 25. Encryption -- 26. Working from home -- 27. Hazards related to search engines -- 28. Denial of Service -- 29. Asset Management -- 30. Internet shopping -- 31. Intrusion & extrusion -- 32. Virtual Servers -- 33. Decision Makers -- 34. Outsourcing ! Glossary. N2 - Business Continuity and Information Security are increasingly important processes in the governance and management of organizations. The key emphasis of this book is on the practical application of the BC & IS principles, and covers these topics in two distinct sections. Part I looks at the BS25999 - part 2 standard, and the Business Continuity management process it describes. The second part pragmatically covers the principal Information Security topics in a non-technical manner. This valuable resource includes many tips and tricks, clear dos and don'ts and best practices, within a structured framework that simplifies its reading for different profiles of stakeholders such as: board members, executives, plan managers, auditors, sopespersons, ICT staff, etc ER -