Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential
Information assurance handbook: effective computer security and risk management strategies
β Scribed by Hernandez, Steven;Schou, Corey
- Publisher
- McGraw-Hill Education
- Year
- 2015
- Tongue
- English
- Leaves
- 481
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
"Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning and IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small business and global enterprises alike"--
β¦ Table of Contents
Machine generated contents note: Part I Information Security Infrastructure --
1: The Need for Information Security --
2: Concepts in Informaiton Security --
3: Assets, Threats, Vulnerabilities, Risks, and Controls --
4: Security Professionals and Organizations --
5: Information Security management System --
6: Implementing Information Security Strategy into Current Practices, Regulations, and Plans --
Part II Information Security Planning Process --
7: Approaches to Implementing Information Security --
8: Organizational Structure for Mananging Information Security --
9: Asset Management --
10: Information Security Risk Management --
11: Information Security Policy --
12: Human Resouce Security --
13: Certification, Accreditation, and Assurance --
Part III Information Security Prevention Process --
14: Information Security in System Development --
15: Physical and Environmental Security Controls --
16: Information Security Awareness, Training, and Education --
17: Preventive Tools and Techniques --
18: Access Control --
Part IV Information Security Detection Process --
19: Information Security Monitoring Tools and Methods --
20: Information Security Measurements and Metrics --
Part V Information Security Recovery Process --
21: Information Security Incident Handling --
22: Computer Forensics --
23: Business Continuity --
24: Backup and Restoration --
Appendices.
β¦ Subjects
Computer networks--Security measures;Computer security;Data protection;Information storage and retrieval systems--Security measures;Electronic books;Handbooks and manuals;Computer networks -- Security measures -- Handbooks, manuals, etc;Computer security -- Handbooks, manuals, etc;Data protection -- Handbooks, manuals, etc;Information storage and retrieval systems -- Security measures -- Handbooks, manuals, etc;Computer networks -- Security measures;Information storage and retrieval systems -- S
π SIMILAR VOLUMES
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential
Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technologyβs recommendations. This book will show you how to implement information assurance risk management strategies within your organization. Aimed at system administrato
<p><span>Learn how to deploy information assurance risk management strategies that align with the National Institute of Standards and Technologyβs recommendations. This book will show you how to implement information assurance risk management strategies within your organization. </span></p><p><span>
<span>When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations t