Information Security FundamentalsCRC Press, 16/10/2013 - 438 páginas Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals w |
Índice
Organization of Information Security | 1 |
Cryptology | 21 |
Risk Management The Facilitated Risk Analysis and Assessment Process | 43 |
Building and Maintaining an Effective Security Awareness Program | 93 |
Physical Security | 131 |
Disaster Recovery and Business Continuity Planning | 145 |
Continuity of Operations Planning | 153 |
Access Controls | 203 |
Information Security Incident Management | 257 |
Asset Classification | 281 |
Threats to Information Security | 311 |
Information Security Policies A Practitioners View | 333 |
341 | |
Facilitated Risk Analysis and Assessment Process FRAAP | 353 |
Business Impact Analysis | 367 |
Back Cover | 377 |
Outras edições - Ver tudo
Palavras e frases frequentes
access control activities analysis application appropriate areas attack audit awareness program business continuity Business Impact Analysis business processes Caesar cipher cipher ciphertext CISSP communication compliance computer security confidential CoOP critical data center decrypt detection document effect employees encryption ensure environment established event example external facility Figure files firewall FRAAP session function hardware identify impact implement incident management incident response information assets information classification information owner information resources information security manager information security policy information security program information systems integrity internal intrusion detection system logs modular arithmetic monitor operations organization organization's organizational password personnel plaintext protection qubit requirements risk assessment risk assessment process risk level security awareness sensitive server social engineering specific staff standards Substitution Ciphers team members testing threats tion transposition cipher unauthorized US-CERT vulnerabilities