Information security fundamentals

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamen...

Full description

Bibliographic Details
Main Author: Peltier, Thomas R.
Format: eBook
Language:English
Published: Boca Raton [Florida] CRC Press, Taylor & Francis Group 2014
Edition:Second edition
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 03865nmm a2200505 u 4500
001 EB001926259
003 EBX01000000000000001089161
005 00000000000000.0
007 cr|||||||||||||||||||||
008 210123 ||| eng
020 |a 9781439810620 
020 |a 9781439810637 
020 |a 0429130287 
020 |a 1439810621 
020 |a 143981063X 
050 4 |a QA76.9.A25 
100 1 |a Peltier, Thomas R. 
245 0 0 |a Information security fundamentals  |c Thomas R. Peltier 
250 |a Second edition 
260 |a Boca Raton [Florida]  |b CRC Press, Taylor & Francis Group  |c 2014 
300 |a 375 pages  |b illustrations 
505 0 |a 1. Developing Policies -- 2. Organization of Information Security -- 3. Cryptology -- 4. Risk Management: The Facilitated Risk Analysis and Assessment Process -- 5. Building and Maintaining an Effective Security Awareness Program -- 6. Physical Security -- 7. Disaster Recovery and Business Continuity Planning -- 8. Continuity of Operations Planning -- 9. Access Controls -- 10. Information System Development, Acquisition, and Maintenance -- 11. Information Security Incident Management -- 12. Asset Classification -- 13. Threats to Information Security -- 14. Information Security Policies: A Practitioner's View -- Glossary -- Appendix A. Facilitated Risk Analysis and Assessment Process (FRAAP) -- Appendix B. Business Impact Analysis 
505 0 |a Includes bibliographical references 
653 |a Computer security 
653 |a Data protection / fast 
653 |a BUSINESS & ECONOMICS / Commerce / bisacsh 
653 |a Computer Security 
653 |a COMPUTERS / Security / General / bisacsh 
653 |a Sécurité informatique 
653 |a Data protection / http://id.loc.gov/authorities/subjects/sh85035859 
653 |a Computer security / fast 
653 |a Protection de l'information (Informatique) 
653 |a COMPUTERS / Information Technology / bisacsh 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
028 5 0 |a 10.1201/b15573 
776 |z 143981063X 
776 |z 1439810621 
776 |z 9781439810637 
776 |z 9781439810620 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439810637/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8 
082 0 |a 381 
082 0 |a 330 
520 |a "Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program. The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"--