Information Security Management Principles

Book description

How safe is your information? Commercial, personal and sensitive information is very hard to keep secure and technological solutions are not the only answer. Information security is largely a management issue and this book outlines the key management techniques for securing data.

Table of contents

  1. Copyright (1/2)
  2. Copyright (2/2)
  3. Contents
  4. List of Figures and Tables
  5. Authors
  6. Acknowledgements
  7. Abbreviations
  8. Preface
  9. 1 Information Security Principles
    1. CONCEPTS AND DEFINITIONS
    2. THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY (1/3)
    3. THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY (2/3)
    4. THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY (3/3)
  10. 2 Information Risk
    1. THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS
    2. RISK MANAGEMENT (1/3)
    3. RISK MANAGEMENT (2/3)
    4. RISK MANAGEMENT (3/3)
    5. REFERENCES AND FURTHER READING
  11. 3 Information Security Framework
    1. INFORMATION SECURITY MANAGEMENT
    2. POLICY, STANDARDS AND PROCEDURES
    3. INFORMATION SECURITY GOVERNANCE
    4. SECURITY INCIDENT MANAGEMENT
    5. INFORMATION SECURITY IMPLEMENTATION
    6. LEGAL FRAMEWORK (1/3)
    7. LEGAL FRAMEWORK (2/3)
    8. LEGAL FRAMEWORK (3/3)
    9. SECURITY STANDARDS AND PROCEDURES (1/3)
    10. SECURITY STANDARDS AND PROCEDURES (2/3)
    11. SECURITY STANDARDS AND PROCEDURES (3/3)
  12. 4 Information Security Controls
    1. PROTECTION FROM MALICIOUS SOFTWARE
    2. PEOPLE (1/2)
    3. PEOPLE (2/2)
    4. USER ACCESS CONTROLS (1/2)
    5. USER ACCESS CONTROLS (2/2)
    6. NETWORKS AND COMMUNICATIONS (1/2)
    7. NETWORKS AND COMMUNICATIONS (2/2)
    8. EXTERNAL SERVICES
    9. IT INFRASTRUCTURE (1/2)
    10. IT INFRASTRUCTURE (2/2)
    11. IT TESTING, AUDIT AND REVIEW
    12. SYSTEMS DEVELOPMENT AND SUPPORT (1/2)
    13. SYSTEMS DEVELOPMENT AND SUPPORT (2/2)
    14. THE ROLE OF CRYPTOGRAPHY (1/2)
    15. THE ROLE OF CRYPTOGRAPHY (2/2)
    16. TRAINING
    17. PHYSICAL AND ENVIRONMENTAL SECURITY (1/3)
    18. PHYSICAL AND ENVIRONMENTAL SECURITY (2/3)
    19. PHYSICAL AND ENVIRONMENTAL SECURITY (3/3)
    20. DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT (1/2)
    21. DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT (2/2)
    22. INVESTIGATIONS AND FORENSICS (1/3)
    23. INVESTIGATIONS AND FORENSICS (2/3)
    24. INVESTIGATIONS AND FORENSICS (3/3)
    25. NOTES
    26. REFERENCES AND FURTHER READING
  13. Index
  14. Back Cover

Product information

  • Title: Information Security Management Principles
  • Author(s): Andy Taylor, David Alexander, Amanda French, David Sutton
  • Release date: September 2008
  • Publisher(s): British Informatics Society Limited
  • ISBN: 9781902505909