Management of Information Security 4th Edition

Management of Information Security 4th Edition
  • Author: Michael E. Whitman and Herbert J. Mattord
    Publisher: Course Technology
    Genres: Management
    Publish Date: October 7, 2013
    ISBN-10: 1285062299
    Pages: 592
    File Type: PDF
    Language: English


Book Preface

As global networks continue to expand, the interconnections among them become ever more vital to the smooth operation of commerce, which depends on communication and computing systems. However, escalating attacks on information assets and the success of criminal attackers illustrate the weaknesses in current information technologies and the need for heightened information security.

To secure systems and networks, organizations must draw on the available pool of information security practitioners. These same organizations will in future count on the next generation of professionals to have the correct mix of skills and experiences to develop more secure computing environments. Students of technology must learn to recognize the threats and vulnerabilities present in existing systems. They must also learn how to design and implement secure systems that will address these threats in the future.

Brief Table of Contents

PREFACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv
FOREWORD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xxiii
CHAPTER 1
Introduction to the Management of Information Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
CHAPTER 2
Planning for Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
CHAPTER 3
Planning for Contingencies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
CHAPTER 4
Information Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
CHAPTER 5
Developing the Security Program. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
CHAPTER 6
Security Management Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
CHAPTER 7
Security Management Practices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247
CHAPTER 8
Risk Management: Identifying and Assessing Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279
CHAPTER 9
Risk Management: Controlling Risk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
CHAPTER 10
Protection Mechanisms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
CHAPTER 11
Personnel and Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
CHAPTER 12
Law and Ethics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
APPENDIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
GLOSSARY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533
INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545

  • File Type: PDF
  • Upload Date: March 3, 2017

Do you like this book? Please share with your friends!

How to Read and Open File Type for PC ?


You may also be interested in the following ebook:

Cambridge Handbook of Strategy as Practice Cambridge Handbook of Strategy as Practice
  • Damon Golsorkhi and Linda Rouleau
Organizational Behavior 11th Edition Organizational Behavior 11th Edition
  • John R. Schermerhorn Jr. and Hunt