000 03732nam a22003375a 4500
001 32969
005 20240430145008.0
008 110316s2011 nyu 000 0 eng
010 _a 2011925445
020 _a9781435480308 (pbk.)
020 _a1435480309
050 1 4 _aQA76.9.A25
_bW459 2011
090 _aQA 76.9 .A25 W459 2011
100 1 _aWhitman, Michael.
_935416
245 1 0 _aRoadmap to information security :
_bfor it and InfoSec managers /
_cMichael E. Whitman and Herbert J. Mattord; forward by Donn B. Parker.
250 _a1st ed.
260 _aClifton Park, NY :
_bCengage Learning,
_c2011.
300 _axxix, 523p. ;
_c23 cm.
520 _aProvides an overview of information security and its relationship to the information needs of an organization. This book guides the information technology manager in dealing with the challenges associated with the security aspects of their role, presenting guidance on assessing and improving an organization's security.
505 0 _aPart I: OVERVIEW OF THE SECURITY LANDSCAPE. 1. Introduction to the Roadmap to Information Security Roadmap. 2. Threats to Information Assets. 3. Attacks on Information Assets. Part II: STRATEGIC INFORMATION SECURITY: SECURITY GOVERNANCE. 4. Information Technology and Information Security Governance. 5. Information Security Roles and Responsibilities. 6. Positioning the Information Security Function. 7. Conducting an Information Security Assessment. Part III: STRATEGIC INFORMATION SECURITY: RISK MANAGEMENT. 8. Risk Management: Risk Identification. 9. Risk Management: Risk Assessment. 10. Risk Management: Risk Control. 11. Alternate Approaches to Risk Management. PART IV: STRATEGIC INFORMATION SECURITY: STANDARDS, REGULATIONS, LAW AND ETHICS. 12. Standards for Managing the Information Security Program. 13. Emerging Trends in Certification and Accreditation. 14. Dealing with Regulatory Compliance and Key Legal Issues. 15. Other Important Laws for Every IT/Security Manager. 16. Ethics in IT and Information Security. Part V: TACTICAL INFORMATION SECURITY: POLICIES AND PROGRAMS. 17. Information Security Policy: Development and Implementation. 18. Information Security Policy Types: EISP, ISSP, SysSP. 19. Employment Policies and Practices. 20. Implementing Security Education, Training, and Awareness Programs. Part VI: TACTICAL INFORMATION SECURITY: CONTINGENCY PLANNING. 21. Contingency Planning: Planning for the Worst. 22. The Incident Response Plan. 23. The Disaster Recovery Plan. 24. The Business Continuity Plan. Part VII: OPERATIONAL INFORMATION SECURITY: NETWORK SECURITY. 25. Communications and Operations Management. 26. Firewalls. 27. Protecting Remote Access. 28. Intrusion Detection Systems. 29. Scanning and Analysis Tools. Part VIII: OPERATIONAL INFORMATION SECURITY: CRYPTOGRAPHY AND ACCESS CONTROLS. 30. Cryptography in Theory. 31. Cryptography in Practice. 32. Access Controls and Biometrics. 33. Physical Security. Part IX: SUPPLEMENTAL MATERIALS. Appendix A: Information Security Self-Assessment Checklists. Appendix B: Information Security Certification Guidelines - The CISSP/SSCP. Appendix C: Information Security Certification Guidelines - The CISM.
650 0 _aComputer security.
_9159252
650 0 _aInformation technology
_xSecurity measures.
_9159253
650 0 _aData protection.
_9159254
650 0 _aComputer networks
_xSecurity measures.
_9159255
650 0 _aInformation resources management
_xSecurity measures.
_9159256
700 1 _aMattord, Herbert J.
_995823
907 _a32969
_b06-19-11
_c06-19-11
942 _cBOOK
_00
998 _aaudmc
_b06-19-11
_cm
_da
_e-
_feng
_gnyu
_h0
945 _g0
_i5028098
_j0
_laudmc
_o-
_p0.00
_q-
_r-
_s-
_t1
_u0
_v0
_w0
_x0
_yi12292138
_z06-19-11
999 _c32969
_d32969