Information Security Management Handbook, Sixth Edition

Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the pr...

Mô tả đầy đủ

Đã lưu trong:
Chi tiết về thư mục
Những tác giả chính: Tipton, Harold, Krause, Krause
Định dạng: Sách
Ngôn ngữ:English
Được phát hành: CRC Press 2009
Truy cập trực tuyến:http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1555
Các nhãn: Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
Thư viện lưu trữ: Thư viện Trường Đại học Đà Lạt
id oai:scholar.dlu.edu.vn:DLU123456789-1555
record_format dspace
spelling oai:scholar.dlu.edu.vn:DLU123456789-15552009-12-04T01:47:03Z Information Security Management Handbook, Sixth Edition Tipton, Harold Krause, Krause Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation. INFORMATION SECURITY AND RISK MANAGEMENT Security Management Concepts and Principles Change Control Management Data Classification Risk Management Policies, Standards, Procedures and Guidelines Security Awareness Training Security Management Planning Ethics ACCESS CONTROL Access Control Techniques Access Control Administration Identification and Authentication Techniques Access Control Methodologies and Implementation Methods of Attack Monitoring and Penetration Testing CRYPTOGRAPHY Use of Cryptography Cryptographic Concepts, Methodologies, and Practices Private Key Algorithms Public Key Infrastructure (PKI) System Architecture for Implementing Cryptographic Functions Methods of Attack PHYSICAL (ENVIRONMENTAL) SECURITY Elements of Physical Security Technical Controls Environment and Life Safety SECURITY ARCHITECTURE AND DESIGN Principles of Computer and Network Organizations, Architectures, and Designs Principles of Security Models, Architectures and Evaluation Criteria Common Flaws and Security Issues: System Architecture and Design BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING Business Continuity Planning Disaster Recovery Planning Elements of Business Continuity Planning TELECOMMUNICATIONS AND NETWORK SECURITY Communications and Network Security Internet, Intranet, Extranet Security E-mail Security Secure Voice Communications Network Attacks and Countermeasures APPLICATION SECURITY Application Issues Databases and Data Warehousing Systems Development Controls Methods of Attack OPERATIONS SECURITY Concepts Resource Protection Requirements Auditing LAW, COMPLIANCE AND INVESTIGATIONS Information Law Investigations Major Categories of Computer Crime Incident Handling Glossary 2009-12-04T01:47:02Z 2009-12-04T01:47:02Z 2007 Book http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1555 en application/rar CRC Press
institution Thư viện Trường Đại học Đà Lạt
collection Thư viện số
language English
description Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation.
format Book
author Tipton, Harold
Krause, Krause
spellingShingle Tipton, Harold
Krause, Krause
Information Security Management Handbook, Sixth Edition
author_facet Tipton, Harold
Krause, Krause
author_sort Tipton, Harold
title Information Security Management Handbook, Sixth Edition
title_short Information Security Management Handbook, Sixth Edition
title_full Information Security Management Handbook, Sixth Edition
title_fullStr Information Security Management Handbook, Sixth Edition
title_full_unstemmed Information Security Management Handbook, Sixth Edition
title_sort information security management handbook, sixth edition
publisher CRC Press
publishDate 2009
url http://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1555
_version_ 1757657921934589952