Úplné zobrazení záznamu

Toto je statický export z katalogu ze dne 11.05.2024. Zobrazit aktuální podobu v katalogu.

Bibliografická citace

.
0 (hodnocen0 x )
EB
ONLINE
Aalborg : River Publishers, 2021
1 online resource (586 pages)
Externí odkaz    Plný text PDF 
   * Návod pro vzdálený přístup 


ISBN 9781000795905 (electronic bk.)
ISBN 9788770223973
River Publishers Series in Information Science and Technology Ser.
Print version: Petrenko, Sergei Developing an Enterprise Continuity Program Aalborg : River Publishers,c2021 ISBN 9788770223973
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- Acknowledgements -- List of Figures -- List of Tables -- List of Abbreviations -- Glossary -- Introduction -- 1: ECP Relevance -- 1.1 Motivation and Achievable Benefits -- 1.1.1 Examples of Incidents -- 1.1.2 The Main Reasons -- 1.1.3 Economic Feasibility -- 1.1.4 Additional Advantages -- 1.2 ECP Content and Structure -- 1.2.1 Background -- 1.2.2 Cloud Perspectives -- 1.2.3 ECP Practice -- 1.3 Example of Task Statement -- 1.3.1 The Purpose and Objectives of Work -- 1.3.2 Work Duration -- 1.4 Analysis of BCM Technologies -- 1.4.1 General Approaches and Directions -- 1.4.2 Infrastructure Decisions -- 1.4.3 Software -- 1.5 Business Continuity and Cyber Resilience -- 1.5.1 Basic Concepts and Definitions of Cyber Resilience -- 1.5.2 Cyber Transformation Trends -- 1.5.3 Mathematical Problem Definition -- 2: BCM Best Practice -- 2.1 The International ISO 22301:2019 Standard -- 2.1.1 First Version of the Standard -- 2.1.2 Second Version of Standard -- 2.2 BCI Practice -- 2.2.1 Activity Directions -- 2.2.2 Main Results -- 2.3 DRI Practice -- 2.3.1 Direction of Activity -- 2.3.2 Features of the Approach -- 2.4 SANS Institute Practice -- 2.4.1 BCP Development -- 2.4.2 BCP Testing -- 2.5 AS/NZS 5050:2010 Standard -- 2.5.1 Basic Recommendations -- 2.5.2 The Application Specifics -- 2.6 Risk Management Practices -- 2.6.1 ISO 31000 Family of Standards -- 2.6.2 Managing Cyber Risks -- 2.6.3 The NIST SP 800-30 Standard -- 2.6.4 OCTAVE Methodology -- 2.6.5 MG-2 Lifecycle -- 2.6.6 COBIT 2019 Standard -- 2.6.7 SA-CMM Maturity Model -- 2.7 Business Process Description Practices -- 2.7.1 Process Modeling -- 2.7.2 NGOSS Methodology -- 2.8 COBIT Standard 2019 -- 2.8.1 Description of the DSS04 Process -- 2.8.2 DSS04 Maturity Levels -- 2.9 ITIL V4 Library.
2.9.1 The ITSCM Process -- 2.9.2 ITSCM Implementation -- 2.10 ISO/IEC 27001:2013 and ISO/IEC 27031:2011 Standards -- 2.10.1 BCM Aspects -- 2.10.2 BCP Development and Implementation -- 2.11 Possible Measures and Metrics -- 2.11.1 Introducing a Passport System for Programs -- 2.11.2 Intellectual Cyber Resilience Orchestration -- 3: BC Project Management -- 3.1 Accenture Practice -- 3.1.1 RA and BIA -- 3.1.2 Definition of BC Strategy -- 3.1.3 Improving the BC Strategy -- 3.2 Ernst &amp -- Young (E&amp -- Y) Experience -- 3.2.1 ECP Program Maturity Assessment -- 3.2.2 Developing a BCM Strategy -- 3.2.3 Implementing a BCM Strategy -- 3.3 IBM Practice -- 3.3.1 Methods of Work Performance -- 3.3.2 IBM BCRS Approach -- 3.3.3 Services IBM BCRS -- 3.3.4 Example of a Solution Selection -- 3.3.5 Example of Task Statement -- 3.4 Hewlett-Packard Practice -- 3.4.1 Evaluating the Current ECP State -- 3.4.2 Developing a BCM Strategy -- 3.4.3 Implementing a BCM Strategy -- 3.5 EMC Practice -- 3.5.1 Type of Work -- 3.5.2 EMC Methodology -- 3.6 Microsoft Practice -- 3.6.1 Characteristics of the Approach -- 3.6.2 ITCM Function -- 4: ECP Development Samples -- 4.1 Characteristics of the Research Object -- 4.1.1 Current Active Directory Architecture -- 4.1.2 Target Active Directory Architecture -- 4.2 BIA Example -- 4.2.1 Classification of Active Directory Processes and Services -- 4.2.2 Calculating RTO and RPO -- 4.2.3 Active Directory Interrupt Scenarios -- 4.3 Defining BC Strategies -- 4.3.1 General Requirements -- 4.3.2 Detailed Reading of RTO and RPO -- 4.3.3 Selection of Technical Solutions -- 4.3.4 Possible Recovery Strategies -- 4.3.5 Restoring the IT Service -- 4.3.6 The Business Recovery -- 4.4 BCP Example -- 4.4.1 Requirements Analysis -- 4.4.2 BCP Content and Structure -- 4.4.3 Management Procedure -- 4.4.4 BCP Testing -- Conclusion -- References -- Index.
2.9.1 The ITSCM Process -- 2.9.2 ITSCM Implementation -- 2.10 ISO/IEC 27001:2013 and ISO/IEC 27031:2011 Standards -- 2.10.1 BCM Aspects -- 2.10.2 BCP Development and Implementation -- 2.11 Possible Measures and Metrics -- 2.11.1 Introducing a Passport System for Programs -- 2.11.2 Intellectual Cyber Resilience Orchestration -- 3: BC Project Management -- 3.1 Accenture Practice -- 3.1.1 RA and BIA -- 3.1.2 Definition of BC Strategy -- 3.1.3 Improving the BC Strategy -- 3.2 Ernst & -- Young (E& -- Y) Experience -- 3.2.1 ECP Program Maturity Assessment -- 3.2.2 Developing a BCM Strategy -- 3.2.3 Implementing a BCM Strategy -- 3.3 IBM Practice -- 3.3.1 Methods of Work Performance -- 3.3.2 IBM BCRS Approach -- 3.3.3 Services IBM BCRS -- 3.3.4 Example of a Solution Selection -- 3.3.5 Example of Task Statement -- 3.4 Hewlett-Packard Practice -- 3.4.1 Evaluating the Current ECP State -- 3.4.2 Developing a BCM Strategy -- 3.4.3 Implementing a BCM Strategy -- 3.5 EMC Practice -- 3.5.1 Type of Work -- 3.5.2 EMC Methodology -- 3.6 Microsoft Practice -- 3.6.1 Characteristics of the Approach -- 3.6.2 ITCM Function -- 4: ECP Development Samples -- 4.1 Characteristics of the Research Object -- 4.1.1 Current Active Directory Architecture -- 4.1.2 Target Active Directory Architecture -- 4.2 BIA Example -- 4.2.1 Classification of Active Directory Processes and Services -- 4.2.2 Calculating RTO and RPO -- 4.2.3 Active Directory Interrupt Scenarios -- 4.3 Defining BC Strategies -- 4.3.1 General Requirements -- 4.3.2 Detailed Reading of RTO and RPO -- 4.3.3 Selection of Technical Solutions -- 4.3.4 Possible Recovery Strategies -- 4.3.5 Restoring the IT Service -- 4.3.6 The Business Recovery -- 4.4 BCP Example -- 4.4.1 Requirements Analysis -- 4.4.2 BCP Content and Structure -- 4.4.3 Management Procedure -- 4.4.4 BCP Testing -- Conclusion -- References -- Index.
About the Author.
This book will be useful to Chief Information Security Officers, internal and external Certified Information Systems Auditors, senior managers within companies who are responsible for ensuring business continuity and cyber stability, as well as teachers and students of MBA’s, CIO and CSO programs..
001905159
express
(Au-PeEL)EBL6705004
(MiAaPQ)EBC6705004
(OCoLC)1264475996

Zvolte formát: Standardní formát Katalogizační záznam Zkrácený záznam S textovými návěštími S kódy polí MARC