Information Security Management Handbook, Sixth Edition
Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the pr...
Đã lưu trong:
Những tác giả chính: | , |
---|---|
Định dạng: | Sách |
Ngôn ngữ: | English |
Được phát hành: |
CRC Press
2009
|
Truy cập trực tuyến: | https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1555 |
Các nhãn: |
Thêm thẻ
Không có thẻ, Là người đầu tiên thẻ bản ghi này!
|
Thư viện lưu trữ: | Thư viện Trường Đại học Đà Lạt |
---|
id |
oai:scholar.dlu.edu.vn:DLU123456789-1555 |
---|---|
record_format |
dspace |
spelling |
oai:scholar.dlu.edu.vn:DLU123456789-15552009-12-04T01:47:03Z Information Security Management Handbook, Sixth Edition Tipton, Harold Krause, Krause Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice. The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking. US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation. INFORMATION SECURITY AND RISK MANAGEMENT Security Management Concepts and Principles Change Control Management Data Classification Risk Management Policies, Standards, Procedures and Guidelines Security Awareness Training Security Management Planning Ethics ACCESS CONTROL Access Control Techniques Access Control Administration Identification and Authentication Techniques Access Control Methodologies and Implementation Methods of Attack Monitoring and Penetration Testing CRYPTOGRAPHY Use of Cryptography Cryptographic Concepts, Methodologies, and Practices Private Key Algorithms Public Key Infrastructure (PKI) System Architecture for Implementing Cryptographic Functions Methods of Attack PHYSICAL (ENVIRONMENTAL) SECURITY Elements of Physical Security Technical Controls Environment and Life Safety SECURITY ARCHITECTURE AND DESIGN Principles of Computer and Network Organizations, Architectures, and Designs Principles of Security Models, Architectures and Evaluation Criteria Common Flaws and Security Issues: System Architecture and Design BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING Business Continuity Planning Disaster Recovery Planning Elements of Business Continuity Planning TELECOMMUNICATIONS AND NETWORK SECURITY Communications and Network Security Internet, Intranet, Extranet Security E-mail Security Secure Voice Communications Network Attacks and Countermeasures APPLICATION SECURITY Application Issues Databases and Data Warehousing Systems Development Controls Methods of Attack OPERATIONS SECURITY Concepts Resource Protection Requirements Auditing LAW, COMPLIANCE AND INVESTIGATIONS Information Law Investigations Major Categories of Computer Crime Incident Handling Glossary 2009-12-04T01:47:02Z 2009-12-04T01:47:02Z 2007 Book https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1555 en application/rar CRC Press |
institution |
Thư viện Trường Đại học Đà Lạt |
collection |
Thư viện số |
language |
English |
description |
Never before have there been so many laws designed to keep corporations honest. New laws and regulations force companies to develop stronger ethics policies and the shareholders themselves are holding publicly traded companies accountable for their practices. Consumers are also concerned over the privacy of their personal information and current and emerging legislation is reflecting this trend. Under these conditions, it can be difficult to know where to turn for reliable, applicable advice.
The sixth edition of the Information Security Management Handbook addresses up-to-date issues in this increasingly important area. It balances contemporary articles with relevant articles from past editions to bring you a well grounded view of the subject. The contributions cover questions important to those tasked with securing information assets including the appropriate deployment of valuable resources as well as dealing with legal compliance, investigations, and ethics. Promoting the view that the management ethics and values of an organization leads directly to its information security program and the technical, physical, and administrative controls to be implemented, the book explores topics such as risk assessments; metrics; security governance, architecture, and design; emerging threats; standards; and business continuity and disaster recovery. The text also discusses physical security including access control and cryptography, and a plethora of technology issues such as application controls, network security, virus controls, and hacking.
US federal and state legislators continue to make certain that information security is a board-level conversation and the Information Security Management Handbook, Sixth Edition continues to ensure that there you have a clear understanding of the rules and regulations and an effective method for their implementation. |
format |
Book |
author |
Tipton, Harold Krause, Krause |
spellingShingle |
Tipton, Harold Krause, Krause Information Security Management Handbook, Sixth Edition |
author_facet |
Tipton, Harold Krause, Krause |
author_sort |
Tipton, Harold |
title |
Information Security Management Handbook, Sixth Edition |
title_short |
Information Security Management Handbook, Sixth Edition |
title_full |
Information Security Management Handbook, Sixth Edition |
title_fullStr |
Information Security Management Handbook, Sixth Edition |
title_full_unstemmed |
Information Security Management Handbook, Sixth Edition |
title_sort |
information security management handbook, sixth edition |
publisher |
CRC Press |
publishDate |
2009 |
url |
https://scholar.dlu.edu.vn/thuvienso/handle/DLU123456789/1555 |
_version_ |
1819781080549425152 |