Book description
A guide to applying data-centric security concepts for securing enterprise data to enable an agile enterprise
- Learn sample forms and process flows for quick and easy use
- An easy-to-follow reference for implementing information security in the enterprise
- Learn enterprise information security challenges and roadmap to success
In Detail
Enterprise security redefined using a data-centric approach and trust models to transform information security into a business enablement process. It is a unique and forward thinking approach for deciding the best method to secure data in the enterprise, the cloud, and in BYOD environments.
"Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will guide you through redefining your security architecture to be more affective and turn information security into a business enablement process rather than a roadblock. This book will provide you with the areas where security must focus to ensure end-to-end security throughout the enterprise-supporting enterprise initiatives such as cloud and BYOD.
"Enterprise Security: A Data-Centric Approach to Securing the Enterprise" will first introduce the reader to a new security architecture model and then explores the must have security methods and new tools that can used to secure the enterprise.
This book will take a data-centric approach to securing the enterprise through the concept of Trust Models and building a layered security implementation focused on data. This is not your traditional security book focused on point solutions and the network aspect of security.
This book combines best practice methods with new methods to approach enterprise security and how to remain agile as the enterprise demands more access to data from traditionally untrusted assets, hosted solutions, and third parties. Applied Information Security - A Data-Centric Approach to Securing the Enterprise will provide the reader an easy-to-follow flow from architecture to implementation, diagrams and recommended steps, and resources for further research and solution evaluation.
This book is a reference and guide for all levels of enterprise security programs that have realized that non-data centric security is no longer practical and new methods must be used to secure the most critical assets in the enterprise.
Table of contents
-
Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Table of Contents
- Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Credits
- About the Author
- About the Reviewers
- www.packtpub.com
- Preface
- 1. Enterprise Security Overview
- 2. Security Architectures
-
3. Security As a Process
- Risk analysis
- Security policies and standards
- Security exceptions
- Security review of changes
- Summary
- 4. Securing the Network
- 5. Securing Systems
- 6. Securing Enterprise Data
- 7. Wireless Network Security
- 8. The Human Element of Security
- 9. Security Monitoring
- 10. Managing Security Incidents
- A. Applying Trust Models to Develop a Security Architectuture
- B. Risk Analysis, Policy and Standard, and System Hardening Resources
- C. Security Tools List
- D. Security Awareness Resources
- E. Security Incident Response Resources
- Index
Product information
- Title: Enterprise Security: A Data-Centric Approach to Securing the Enterprise
- Author(s):
- Release date: February 2013
- Publisher(s): Packt Publishing
- ISBN: 9781849685962
You might also like
book
People-Centric Security: Transforming Your Enterprise Security Culture
A culture hacking how to complete with strategies, techniques, and resources for securing the most volatile …
book
Building an Information Security Awareness Program
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to …
book
Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment
Use the guidance in this comprehensive field guide to gain the support of your top executives …
book
Advanced Persistent Training : Take Your Security Awareness Program to the Next Level
Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance …