Cargando…

Information Security A Practical Guide : Bridging the gap between IT and management.

Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mooney, Tom
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely : IT Governance Ltd, 2015.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_ocn914151232
003 OCoLC
005 20231005004200.0
006 m o d
007 cr |n|||||||||
008 150801s2015 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d DEBSZ  |d OCLCQ  |d YDXCP  |d N$T  |d STF  |d B24X7  |d OCLCO  |d COO  |d OCLCF  |d OCLCO  |d JSTOR  |d OCLCO  |d OCLCQ  |d OCLCO  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d OCLCQ  |d LVT  |d AU@  |d OCLCQ  |d AUW  |d OCLCQ  |d UKSSU  |d VLY  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 921279215  |a 1162151827  |a 1241946670 
020 |a 9781849287418  |q (electronic bk.) 
020 |a 1849287414  |q (electronic bk.) 
020 |z 9781849287425 
020 |z 1849287422 
020 |z 1849287406 
020 |z 9781849287401 
029 1 |a AU@  |b 000060909286 
029 1 |a AU@  |b 000067103023 
029 1 |a DEBSZ  |b 442838956 
029 1 |a DEBSZ  |b 446071501 
035 |a (OCoLC)914151232  |z (OCoLC)921279215  |z (OCoLC)1162151827  |z (OCoLC)1241946670 
037 |a 22573/ctt1508j10  |b JSTOR 
050 4 |a K3264.C65 
072 7 |a SOC  |x 004000  |2 bisacsh 
072 7 |a COM000000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 364.16 
049 |a UAMI 
100 1 |a Mooney, Tom. 
245 1 0 |a Information Security A Practical Guide :  |b Bridging the gap between IT and management. 
260 |a Ely :  |b IT Governance Ltd,  |c 2015. 
300 |a 1 online resource (134 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk Treatments. 
505 8 |a Chapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapter Overview; Objectives; Points of Contact with your Peers; How to Engage with your Peers; Chapter 7: Documenting the System For Everyone; Chapter Overview; Objectives; Setting the Scene. 
505 8 |a EntitiesService Overview; Adding Boundaries; Showing Information Flow; Adding the Threats; Chapter 8: Mapping Data in the System; Chapter Overview; Objectives; Mapping Data; Chapter 9: Penetration Testing; Chapter Overview; Objectives; Types of Penetration Test; Scoping the test; Trusting the Testers; Implementing Fixes; Chapter 10: Information Security Policy; Chapter Overview; Objectives; The Advantages of Security Policies; Giving Your Policies Teeth; Key Security Policies; Ways of Ensuring Your Policy is Read; ITG Resources. 
520 |a Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole. 
546 |a English. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
650 0 |a Computer security  |x Management. 
650 0 |a Information technology  |x Management. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Technologie de l'information  |x Gestion. 
650 7 |a SOCIAL SCIENCE  |x Criminology.  |2 bisacsh 
650 7 |a COMPUTERS  |x General.  |2 bisacsh 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Information technology  |x Management  |2 fast 
776 0 8 |i Print version:  |a Mooney, Tom.  |t Information Security A Practical Guide : Bridging the gap between IT and management.  |d Ely : IT Governance Ltd, ©2015  |z 9781849287401 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt155j4c1  |z Texto completo 
936 |a BATCHLOAD 
938 |a Books 24x7  |b B247  |n bks00093177 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL2048580 
938 |a EBSCOhost  |b EBSC  |n 1030092 
938 |a YBP Library Services  |b YANK  |n 12535325 
938 |a YBP Library Services  |b YANK  |n 12535376 
994 |a 92  |b IZTAP