๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

A practical guide to security engineering and information assurance

โœ Scribed by Debra S. Herrmann


Publisher
Auerbach Publications
Year
2001
Tongue
English
Leaves
410
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


โ€ข Examines the impact of both accidental and malicious, intentional action and inaction
โ€ข Defines the five major components of a comprehensive and effective program
โ€ข Introduces the concept of IA integrity levels and provides a complete methodology for information security/IA throughout the life of a system
โ€ข Contains abundant practical how-to information, examples, templates, and discussion problems
โ€ข Includes a glossary of acronyms and terms and a glossary of 80 techniques
โ€ข Summarizes the components, activities, and tasks of an effective program

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority.
A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise.
The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.
The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.


๐Ÿ“œ SIMILAR VOLUMES


A Practical Guide to Managing Informatio
โœ Steve Purser ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Artech Print on Demand ๐ŸŒ English

This groundbreaking book helps you master the management of information security, concentrating on the proactive recognition and resolution of the practical issues of developing and implementing IT security for the enterprise. Drawing upon the authors' wealth of valuable experience in high-risk comm

Engineering Information Security: The Ap
โœ Stuart Jacobs ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› John Wiley & Sons ๐ŸŒ English

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of pr

Engineering Information Security: The Ap
โœ Stuart Jacobs ๐Ÿ“‚ Library ๐Ÿ“… 2011 ๐Ÿ› Wiley-IEEE Press ๐ŸŒ English

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of pr