Book description
Taking a process-focused approach, A Practical Guide to Security Assessments presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks.
Table of contents
- Front cover
- About the Author
- Preface
- Table of Contents (1/2)
- Table of Contents (2/2)
- Chapter 1. Introduction
- Chapter 2. Evolution of Information Security (1/8)
- Chapter 2. Evolution of Information Security (2/8)
- Chapter 2. Evolution of Information Security (3/8)
- Chapter 2. Evolution of Information Security (4/8)
- Chapter 2. Evolution of Information Security (5/8)
- Chapter 2. Evolution of Information Security (6/8)
- Chapter 2. Evolution of Information Security (7/8)
- Chapter 2. Evolution of Information Security (8/8)
- Chapter 3. The Information Security Program and How a Security Assessment Fits In (1/5)
- Chapter 3. The Information Security Program and How a Security Assessment Fits In (2/5)
- Chapter 3. The Information Security Program and How a Security Assessment Fits In (3/5)
- Chapter 3. The Information Security Program and How a Security Assessment Fits In (4/5)
- Chapter 3. The Information Security Program and How a Security Assessment Fits In (5/5)
- Chapter 4. Planning (1/8)
- Chapter 4. Planning (2/8)
- Chapter 4. Planning (3/8)
- Chapter 4. Planning (4/8)
- Chapter 4. Planning (5/8)
- Chapter 4. Planning (6/8)
- Chapter 4. Planning (7/8)
- Chapter 4. Planning (8/8)
- Chapter 5. Initial Information Gathering (1/8)
- Chapter 5. Initial Information Gathering (2/8)
- Chapter 5. Initial Information Gathering (3/8)
- Chapter 5. Initial Information Gathering (4/8)
- Chapter 5. Initial Information Gathering (5/8)
- Chapter 5. Initial Information Gathering (6/8)
- Chapter 5. Initial Information Gathering (7/8)
- Chapter 5. Initial Information Gathering (8/8)
- Chapter 6. Business Process Evaluation (1/6)
- Chapter 6. Business Process Evaluation (2/6)
- Chapter 6. Business Process Evaluation (3/6)
- Chapter 6. Business Process Evaluation (4/6)
- Chapter 6. Business Process Evaluation (5/6)
- Chapter 6. Business Process Evaluation (6/6)
- Chapter 7. Technology Evaluation (1/6)
- Chapter 7. Technology Evaluation (2/6)
- Chapter 7. Technology Evaluation (3/6)
- Chapter 7. Technology Evaluation (4/6)
- Chapter 7. Technology Evaluation (5/6)
- Chapter 7. Technology Evaluation (6/6)
- Chapter 8. Risk Analysis and Final Presentation (1/8)
- Chapter 8. Risk Analysis and Final Presentation (2/8)
- Chapter 8. Risk Analysis and Final Presentation (3/8)
- Chapter 8. Risk Analysis and Final Presentation (4/8)
- Chapter 8. Risk Analysis and Final Presentation (5/8)
- Chapter 8. Risk Analysis and Final Presentation (6/8)
- Chapter 8. Risk Analysis and Final Presentation (7/8)
- Chapter 8. Risk Analysis and Final Presentation (8/8)
- Chapter 9. Information Security Standards (1/4)
- Chapter 9. Information Security Standards (2/4)
- Chapter 9. Information Security Standards (3/4)
- Chapter 9. Information Security Standards (4/4)
- Chapter 10. Information Security Legislation (1/2)
- Chapter 10. Information Security Legislation (2/2)
- Security Questionnaires and Checklists
- Appendices: Security Questionnaires and Checklists
- Appendix A: Preliminary Checklist to Gather Information (1/3)
- Appendix A: Preliminary Checklist to Gather Information (2/3)
- Appendix A: Preliminary Checklist to Gather Information (3/3)
- Appendix B: Generic Questionnaire for Meetings with Business Process Owners (1/2)
- Appendix B: Generic Questionnaire for Meetings with Business Process Owners (2/2)
- Appendix C: Generic Questionnaire for Meetings with Technology Owners (1/2)
- Appendix C: Generic Questionnaire for Meetings with Technology Owners (2/2)
- Appendix D: Data Classification (1/2)
- Appendix D: Data Classification (2/2)
- Appendix E: Data Retention (1/2)
- Appendix E: Data Retention (2/2)
- Appendix F: Backup and Recovery (1/3)
- Appendix F: Backup and Recovery (2/3)
- Appendix F: Backup and Recovery (3/3)
- Appendix G: Externally Hosted Services (1/4)
- Appendix G: Externally Hosted Services (2/4)
- Appendix G: Externally Hosted Services (3/4)
- Appendix G: Externally Hosted Services (4/4)
- Appendix H: Physical Security (1/4)
- Appendix H: Physical Security (2/4)
- Appendix H: Physical Security (3/4)
- Appendix H: Physical Security (4/4)
- Appendix I: Employee Termination (1/2)
- Appendix I: Employee Termination (2/2)
- Appendix J: Incident Handling (1/2)
- Appendix J: Incident Handling (2/2)
- Appendix K: Business to Business (B2B) (1/2)
- Appendix K: Business to Business (B2B) (2/2)
- Appendix L: Business to Consumer (B2C) (1/3)
- Appendix L: Business to Consumer (B2C) (2/3)
- Appendix L: Business to Consumer (B2C) (3/3)
- Appendix M: Change Management (1/2)
- Appendix M: Change Management (2/2)
- Appendix N: User ID Administration (1/3)
- Appendix N: User ID Administration (2/3)
- Appendix N: User ID Administration (3/3)
- Appendix O: Managed Security (1/3)
- Appendix O: Managed Security (2/3)
- Appendix O: Managed Security (3/3)
- Appendix P: Media Handling (1/2)
- Appendix P: Media Handling (2/2)
- Appendix Q: HIPAA Security (1/13)
- Appendix Q: HIPAA Security (2/13)
- Appendix Q: HIPAA Security (3/13)
- Appendix Q: HIPAA Security (4/13)
- Appendix Q: HIPAA Security (5/13)
- Appendix Q: HIPAA Security (6/13)
- Appendix Q: HIPAA Security (7/13)
- Appendix Q: HIPAA Security (8/13)
- Appendix Q: HIPAA Security (9/13)
- Appendix Q: HIPAA Security (10/13)
- Appendix Q: HIPAA Security (11/13)
- Appendix Q: HIPAA Security (12/13)
- Appendix Q: HIPAA Security (13/13)
- Index (1/3)
- Index (2/3)
- Index (3/3)
- Back cover
Product information
- Title: A Practical Guide to Security Assessments
- Author(s):
- Release date: September 2004
- Publisher(s): Auerbach Publications
- ISBN: 9780203507230
You might also like
book
Handbook of System Safety and Security
Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat …
book
The Effective Security Officer's Training Manual, 3rd Edition
The Effective Security Officer's Training Manual, Third Edition teaches today’s security officers the most important aspects …
book
Information Security Management Handbook, Volume 7, 6th Edition
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and …
book
How to Complete a Risk Assessment in 5 Days or Less
Based on the seminars of Tom Peltier, this volume presents the various processes that an organization …