Introduction to Information Security. A Strategic-Based Approach
β Scribed by Timothy Shimeall and Jonathan Spring (Auth.)
- Publisher
- Syngress
- Year
- 2014
- Leaves
- 359
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.
Information security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.
- Provides a broad introduction to the methods and techniques in the field of information security
- OffersΒ a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information
- Provides very current view of the emerging standards of practice in information security
β¦ Table of Contents
Content:
Front-matter, Pages i,iii
Copyright, Page iv
Acknowledgments, Pages xiii-xv
Introduction, Pages xvii-xxi
Chapter 1 - Motivation and Security Definitions, Pages 1-20
Chapter 2 - Strategies and Security, Pages 21-39
Chapter 3 - Deception Strategies: Networks, Organization, and Structures, Pages 43-60
Chapter 4 - Deception Strategies: Defensive Technologies, Pages 61-79
Chapter 5 - Frustration Strategies: Technical Controls, Pages 83-106
Chapter 6 - Frustration Strategies: Formal Verification, Pages 107-121
Chapter 7 - Resistance Strategies: Authentication and Permissions, Pages 125-154
Chapter 8 - Resistance Strategies: Symmetric Encryption, Pages 155-183,e184-e185,184-186
Chapter 9 - Resistance Strategies: Partitioning and Need to Know, Pages 187-200
Chapter 10 - Change Management, Pages 201-231
Chapter 11 - Network Analysis and Forensics, Pages 235-251
Chapter 12 - Recognition Strategies: Intrusion Detection and Prevention, Pages 253-274
Chapter 13 - Digital Forensics, Pages 275-302
Chapter 14 - Recognition Strategies: Integrity Detection, Pages 303-316
Chapter 15 - Recovery of Security, Pages 317-337
Chapter 16 - Professional Certifications and Overall Conclusions, Pages 339-352
Index, Pages 353-360
π SIMILAR VOLUMES
<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance
<p>The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance
In the Digital Age you need to find new approaches for Information and Cyber Security. This book describes the risk-based approach to transform information security considering the influences of the human factor. It is intended for people who want to protect the information of an organization in a h