Skip to Content
Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices
book

Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

by William Stallings
December 2019
Intermediate to advanced
500 pages
16h 2m
English
Addison-Wesley Professional
Content preview from Information Privacy Engineering and Privacy by Design: Understanding Privacy Threats, Technology, and Regulations Based on Standards and Best Practices

Chapter 13. Event Monitoring, Auditing, and Incident Response

Learning Objectives

After studying this chapter, you should be able to:

  • Understand the difference between a security event and a security incident

  • List useful information to collect in security audit trails

  • Summarize the SP 800-53 security audit controls

  • Present a typical privacy audit checklist

  • Present an overview of the privacy incident management process

This chapter deals with activities an organization pursues after privacy controls and policies have been implemented. The key objectives are to assess the effectiveness of the privacy program and to respond to privacy breaches. Sections 13.1 through 13.3 deal with collecting and assessing information related to the effectiveness ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Privacy, Regulations, and Cybersecurity

Privacy, Regulations, and Cybersecurity

Chris Moschovitis

Publisher Resources

ISBN: 9780135278383