Book description
How safe is your information? Commercial, personal and sensitive information is very hard to keep secure and technological solutions are not the only answer. Information security is largely a management issue and this book outlines the key management techniques for securing data.
Table of contents
- Copyright (1/2)
- Copyright (2/2)
- Contents
- List of Figures and Tables
- Authors
- Acknowledgements
- Abbreviations
- Preface
- 1 Information Security Principles
- 2 Information Risk
-
3 Information Security Framework
- INFORMATION SECURITY MANAGEMENT
- POLICY, STANDARDS AND PROCEDURES
- INFORMATION SECURITY GOVERNANCE
- SECURITY INCIDENT MANAGEMENT
- INFORMATION SECURITY IMPLEMENTATION
- LEGAL FRAMEWORK (1/3)
- LEGAL FRAMEWORK (2/3)
- LEGAL FRAMEWORK (3/3)
- SECURITY STANDARDS AND PROCEDURES (1/3)
- SECURITY STANDARDS AND PROCEDURES (2/3)
- SECURITY STANDARDS AND PROCEDURES (3/3)
-
4 Information Security Controls
- PROTECTION FROM MALICIOUS SOFTWARE
- PEOPLE (1/2)
- PEOPLE (2/2)
- USER ACCESS CONTROLS (1/2)
- USER ACCESS CONTROLS (2/2)
- NETWORKS AND COMMUNICATIONS (1/2)
- NETWORKS AND COMMUNICATIONS (2/2)
- EXTERNAL SERVICES
- IT INFRASTRUCTURE (1/2)
- IT INFRASTRUCTURE (2/2)
- IT TESTING, AUDIT AND REVIEW
- SYSTEMS DEVELOPMENT AND SUPPORT (1/2)
- SYSTEMS DEVELOPMENT AND SUPPORT (2/2)
- THE ROLE OF CRYPTOGRAPHY (1/2)
- THE ROLE OF CRYPTOGRAPHY (2/2)
- TRAINING
- PHYSICAL AND ENVIRONMENTAL SECURITY (1/3)
- PHYSICAL AND ENVIRONMENTAL SECURITY (2/3)
- PHYSICAL AND ENVIRONMENTAL SECURITY (3/3)
- DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT (1/2)
- DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT (2/2)
- INVESTIGATIONS AND FORENSICS (1/3)
- INVESTIGATIONS AND FORENSICS (2/3)
- INVESTIGATIONS AND FORENSICS (3/3)
- NOTES
- REFERENCES AND FURTHER READING
- Index
- Back Cover
Product information
- Title: Information Security Management Principles
- Author(s):
- Release date: September 2008
- Publisher(s): British Informatics Society Limited
- ISBN: 9781902505909
You might also like
book
Identity and Access Management
provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM …
book
Simple Steps to Data Encryption
Everyone wants privacy and security online, something that most computer users have more or less given …
book
Cybersecurity Essentials
An accessible introduction to cybersecurity concepts and practices Cybersecurity Essentials provides a comprehensive introduction to the …
book
Web Security for Developers
The world has changed. Today, every time you make a site live, you’re opening it up …