𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Introduction to Information Security. A Strategic-Based Approach

✍ Scribed by Timothy Shimeall and Jonathan Spring (Auth.)


Publisher
Syngress
Year
2014
Leaves
359
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.

Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.

  • Provides a broad introduction to the methods and techniques in the field of information security
  • OffersΒ a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information
  • Provides very current view of the emerging standards of practice in information security

✦ Table of Contents


Content:
Front-matter, Pages i,iii
Copyright, Page iv
Acknowledgments, Pages xiii-xv
Introduction, Pages xvii-xxi
Chapter 1 - Motivation and Security Definitions, Pages 1-20
Chapter 2 - Strategies and Security, Pages 21-39
Chapter 3 - Deception Strategies: Networks, Organization, and Structures, Pages 43-60
Chapter 4 - Deception Strategies: Defensive Technologies, Pages 61-79
Chapter 5 - Frustration Strategies: Technical Controls, Pages 83-106
Chapter 6 - Frustration Strategies: Formal Verification, Pages 107-121
Chapter 7 - Resistance Strategies: Authentication and Permissions, Pages 125-154
Chapter 8 - Resistance Strategies: Symmetric Encryption, Pages 155-183,e184-e185,184-186
Chapter 9 - Resistance Strategies: Partitioning and Need to Know, Pages 187-200
Chapter 10 - Change Management, Pages 201-231
Chapter 11 - Network Analysis and Forensics, Pages 235-251
Chapter 12 - Recognition Strategies: Intrusion Detection and Prevention, Pages 253-274
Chapter 13 - Digital Forensics, Pages 275-302
Chapter 14 - Recognition Strategies: Integrity Detection, Pages 303-316
Chapter 15 - Recovery of Security, Pages 317-337
Chapter 16 - Professional Certifications and Overall Conclusions, Pages 339-352
Index, Pages 353-360


πŸ“œ SIMILAR VOLUMES


Risk Management Framework: A Lab-Based A
✍ James Broad πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance

Risk Management Framework: A Lab-Based A
✍ James Broad πŸ“‚ Library πŸ“… 2013 πŸ› Syngress 🌐 English

<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance

Digital Age--How to approach Cyber Secur
✍ Andreas Von Grebmer πŸ“‚ Library πŸ“… 2017 πŸ› Books on Demand 🌐 English

In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h