O'Reilly logo

Managing Information Security: Studies from real life by Michael Krausz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 3: WHAT IS A BREACH?

Defining what constitutes a breach of information is not easy. Does only criminal activity constitute a breach? Is it only the things we read and hear about in the media (such as the army ‘losing’ data), or does everything that causes damage count as a breach? These are practical questions, even though they may sound strange at first.

When establishing the roles, responsibilities, processes and technologies required in a company to ensure information security, these questions can be answered with ease at the technical level. They start to become more complex once the differing views of affected departments come to light; and the situation is aggravated when the parties involved lose focus and start playing politics ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required