Security Planning An Applied Approach

This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planni...

Full description

Bibliographic Details
Main Author: Lincke, Susan
Format: eBook
Language:English
Published: Cham Springer International Publishing 2015, 2015
Edition:1st ed. 2015
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 02857nmm a2200325 u 4500
001 EB001034670
003 EBX01000000000000000828186
005 00000000000000.0
007 cr|||||||||||||||||||||
008 150702 ||| eng
020 |a 9783319160276 
100 1 |a Lincke, Susan 
245 0 0 |a Security Planning  |h Elektronische Ressource  |b An Applied Approach  |c by Susan Lincke 
250 |a 1st ed. 2015 
260 |a Cham  |b Springer International Publishing  |c 2015, 2015 
300 |a XIV, 287 p. 65 illus  |b online resource 
505 0 |a Preface -- Security Awareness -- Combatting Fraud -- Complying with Security Regulation and Standards -- Managing Risk -- Addressing Business Impact Analysis and Business Continuity -- Governing -- Important Tactical Concepts -- Planning for Network Security -- Designing Physical Security -- Organizing Personal Security -- Planning for Incident Response -- Defining Security Metrics -- Performing an Audit or Security Test -- Complying with HIPAA and HITECH -- Developing Secure Software 
653 |a Business 
653 |a Management science 
653 |a Business and Management 
653 |a Application software 
653 |a Data protection 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
028 5 0 |a 10.1007/978-3-319-16027-6 
856 4 0 |u https://doi.org/10.1007/978-3-319-16027-6?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serves entry level cyber-security courses through those in advanced security planning. Exercises range from easier questions to the challenging case study. This is the first text with an optional semester-long case study: Students plan security for a doctor’s office, which must adhere to HIPAA regulation. For software engineering-oriented students, a chapter on secure software development introduces security extensions to UML and use cases (with case study). The text also adopts the NSA’s Center of Academic Excellence (CAE) revamped 2014 plan, addressing five mandatory and 15 Optional Knowledge Units, as well as many ACM Information Assurance and Security core and elective requirements for Computer Science