The true cost of information security breaches and cyber crime:
This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Ely, Cambridgeshire, U.K.
IT Governance Pub.
2013
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781849284967/?ar |
Summary: | This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. |
Item Description: | Print version record |
Physical Description: | 1 Online-Ressource |
ISBN: | 9781849284967 1849284962 1299823017 9781299823013 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-051702959 | ||
003 | DE-627-1 | ||
005 | 20240228115341.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200417s2013 xx |||||o 00| ||eng c | ||
020 | |a 9781849284967 |c electronic bk. |9 978-1-84928-496-7 | ||
020 | |a 1849284962 |c electronic bk. |9 1-84928-496-2 | ||
020 | |a 1299823017 |9 1-299-82301-7 | ||
020 | |a 9781299823013 |9 978-1-299-82301-3 | ||
035 | |a (DE-627-1)051702959 | ||
035 | |a (DE-599)KEP051702959 | ||
035 | |a (ORHE)9781849284967 | ||
035 | |a (DE-627-1)051702959 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Krausz, Michael |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The true cost of information security breaches and cyber crime |c Michael Krausz, John Walker |
264 | 1 | |a Ely, Cambridgeshire, U.K. |b IT Governance Pub. |c 2013 | |
300 | |a 1 Online-Ressource | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Print version record | ||
520 | |a This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures | |
650 | 0 | |a Computer security |x Management | |
650 | 0 | |a Data protection |v Case studies |x Economic aspects | |
650 | 0 | |a Computer crimes |v Case studies |x Economic aspects | |
650 | 4 | |a Sécurité informatique ; Gestion | |
650 | 4 | |a Protection de l'information (Informatique) ; Aspect économique ; Études de cas | |
650 | 4 | |a Criminalité informatique ; Aspect économique ; Études de cas | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Business enterprises ; Computer networks ; Security measures | |
650 | 4 | |a Computer security ; Management | |
650 | 4 | |a Case studies | |
700 | 1 | |a Walker, John |e VerfasserIn |4 aut | |
776 | 1 | |z 1849284954 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1849284954 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781849284967/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-051702959 |
---|---|
_version_ | 1829007753203417089 |
adam_text | |
any_adam_object | |
author | Krausz, Michael Walker, John |
author_facet | Krausz, Michael Walker, John |
author_role | aut aut |
author_sort | Krausz, Michael |
author_variant | m k mk j w jw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)051702959 (DE-599)KEP051702959 (ORHE)9781849284967 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02387cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-051702959</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115341.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200417s2013 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849284967</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-84928-496-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849284962</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-84928-496-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299823017</subfield><subfield code="9">1-299-82301-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299823013</subfield><subfield code="9">978-1-299-82301-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051702959</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP051702959</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781849284967</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)051702959</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Krausz, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The true cost of information security breaches and cyber crime</subfield><subfield code="c">Michael Krausz, John Walker</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely, Cambridgeshire, U.K.</subfield><subfield code="b">IT Governance Pub.</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection</subfield><subfield code="v">Case studies</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="v">Case studies</subfield><subfield code="x">Economic aspects</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Protection de l'information (Informatique) ; Aspect économique ; Études de cas</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Criminalité informatique ; Aspect économique ; Études de cas</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Business enterprises ; Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security ; Management</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Case studies</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Walker, John</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1849284954</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1849284954</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781849284967/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-051702959 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:35:18Z |
institution | BVB |
isbn | 9781849284967 1849284962 1299823017 9781299823013 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | IT Governance Pub. |
record_format | marc |
spelling | Krausz, Michael VerfasserIn aut The true cost of information security breaches and cyber crime Michael Krausz, John Walker Ely, Cambridgeshire, U.K. IT Governance Pub. 2013 1 Online-Ressource Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Print version record This pocket guide uses case studies to illustrate the possible breach scenarios that an organisation can face. It sets out a sensible, realistic assessment of the actual costs of a data or information breach and explains how managers can determine the business damage caused. Business enterprises Computer networks Security measures Computer security Management Data protection Case studies Economic aspects Computer crimes Case studies Economic aspects Sécurité informatique ; Gestion Protection de l'information (Informatique) ; Aspect économique ; Études de cas Criminalité informatique ; Aspect économique ; Études de cas COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures Computer security ; Management Case studies Walker, John VerfasserIn aut 1849284954 Erscheint auch als Druck-Ausgabe 1849284954 |
spellingShingle | Krausz, Michael Walker, John The true cost of information security breaches and cyber crime Business enterprises Computer networks Security measures Computer security Management Data protection Case studies Economic aspects Computer crimes Case studies Economic aspects Sécurité informatique ; Gestion Protection de l'information (Informatique) ; Aspect économique ; Études de cas Criminalité informatique ; Aspect économique ; Études de cas COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures Computer security ; Management Case studies |
title | The true cost of information security breaches and cyber crime |
title_auth | The true cost of information security breaches and cyber crime |
title_exact_search | The true cost of information security breaches and cyber crime |
title_full | The true cost of information security breaches and cyber crime Michael Krausz, John Walker |
title_fullStr | The true cost of information security breaches and cyber crime Michael Krausz, John Walker |
title_full_unstemmed | The true cost of information security breaches and cyber crime Michael Krausz, John Walker |
title_short | The true cost of information security breaches and cyber crime |
title_sort | true cost of information security breaches and cyber crime |
topic | Business enterprises Computer networks Security measures Computer security Management Data protection Case studies Economic aspects Computer crimes Case studies Economic aspects Sécurité informatique ; Gestion Protection de l'information (Informatique) ; Aspect économique ; Études de cas Criminalité informatique ; Aspect économique ; Études de cas COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures Computer security ; Management Case studies |
topic_facet | Business enterprises Computer networks Security measures Computer security Management Data protection Case studies Economic aspects Computer crimes Case studies Economic aspects Sécurité informatique ; Gestion Protection de l'information (Informatique) ; Aspect économique ; Études de cas Criminalité informatique ; Aspect économique ; Études de cas COMPUTERS ; Security ; General Business enterprises ; Computer networks ; Security measures Computer security ; Management Case studies |
work_keys_str_mv | AT krauszmichael thetruecostofinformationsecuritybreachesandcybercrime AT walkerjohn thetruecostofinformationsecuritybreachesandcybercrime AT krauszmichael truecostofinformationsecuritybreachesandcybercrime AT walkerjohn truecostofinformationsecuritybreachesandcybercrime |