Information Security Handbook
β Scribed by Darren Death
- Publisher
- Packt Publishing
- Year
- 2017
- Tongue
- English
- Leaves
- 419
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Implement information security effectively as per your organizationβs needs.
Key Features
- Learn to build your own information security framework, the best fit for your organization
- Build on the concepts of threat modeling, incidence response, and security analysis
- Practical use cases and best practices for information security
Book Description
Having an information security mechanism is one of the most crucial factors for any organization. Important assets of organization demand a proper risk management and threat model for security, and so information security concepts are gaining a lot of traction. This book starts with the concept of information security and shows you why itβs important.
It then moves on to modules such as threat modeling, risk management, and mitigation. It also covers the concepts of incident response systems, information rights management, and more. Moving on, it guides you to build your own information security framework as the best fit for your organization. Toward the end, youβll discover some best practices that can be implemented to make your security framework strong.
By the end of this book, you will be well-versed with all the factors involved in information security, which will help you build a security framework that is a perfect fit your organizationβs requirements.
What you will learn
- Develop your own information security framework
- Build your incident response mechanism
- Discover cloud security considerations
- Get to know the system development life cycle
- Get your security operation center up and running
- Know the various security testing types
- Balance security as per your business needs
- Implement information security best practices
Who This Book Is For
This book is for security analysts and professionals who deal with security mechanisms in an organization. If you are looking for an end to end guide on information security and risk analysis with no prior knowledge of this domain, then this book is for you.
Table of Contents
- Information and Data Security Fundamentals
- Threat Modeling
- Preparing for Information Security
- Information Security Risk Management
- Developing your Information and Data Security Plan
- Continuous Security Testing and Monitoring
- Business Continuity / Disaster Recovery Planning
- Incident Response Planning
- Developing a Security Operations Center
- Developing a Security Architecture Program
- Cloud Security Considerations
- Information Security Best Practices
β¦ Subjects
Design & Architecture;Hardware & DIY;Computers & Technology;Network Administration;Disaster & Recovery;Email Administration;Linux & UNIX Administration;Storage & Retrieval;Windows Administration;Networking & Cloud Computing;Computers & Technology;Cloud Computing;Networking & Cloud Computing;Computers & Technology
π SIMILAR VOLUMES
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati
Whether you are active in security management or studying for the CISSP exam, you need accurate information you can trust. A practical reference and study guide, <em>Information Security Management Handbook, Fourth Edition, Volume 3</em> prepares you not only for the CISSP exam, but also for your wo
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, <em>Information Security Handbook, Sixth Edition</em> sets the standard on which all IT security programs and certifications are based. Considered the gold-standard reference of Informati
The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for informat