Cargando…

Information security fundamentals /

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamen...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Peltier, Thomas R. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton [Florida] : CRC Press, Taylor & Francis Group, [2014]
Edición:Second edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Developing Policies
  • 2. Organization of Information Security
  • 3. Cryptology
  • 4. Risk Management: The Facilitated Risk Analysis and Assessment Process
  • 5. Building and Maintaining an Effective Security Awareness Program
  • 6. Physical Security
  • 7. Disaster Recovery and Business Continuity Planning
  • 8. Continuity of Operations Planning
  • 9. Access Controls
  • 10. Information System Development, Acquisition, and Maintenance
  • 11. Information Security Incident Management
  • 12. Asset Classification
  • 13. Threats to Information Security
  • 14. Information Security Policies: A Practitioner's View
  • Glossary
  • Appendix A. Facilitated Risk Analysis and Assessment Process (FRAAP)
  • Appendix B. Business Impact Analysis.