Information security involves the protection of organizational assets from the disruption of business operations, modification of sensitive data, or disclosure of proprietary information. The protection of this data is usually described as maintaining the confidentiality, integrity, and availability (CIA) of the organization’s assets, operations, and information. As identified throughout this chapter, security goes beyond technical controls and encompasses people, technology, policy, and operations in a way that few other business objectives do.
Web Security : How Much Is Enough ? " Datamation ( January 1997 ) . Rubin , A. D .; Geer , D .; and Ranum , M. Web Security Sourcebook . New York : John Wiley and Sons , 1997 . Rubin , Aviel and Geer , Daniel . " A Survey of Web ...
Sheila Frankel, Bernard Eydt, Les Owens Karen, Scarfone, NIST Special Publication 800À97: “Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i,” Recommendations of the National Institute of Standards and Technology, ...
[ 4 ] Wilson , M. , et al . , " Information Technology Security Training Requirements : A Role- and Performance - Based Model : Part 1 — Document , " September 2003 , http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf .
This book compels information security professionals to think differently about concepts of risk management in order to be more effective.
The explosion in social networking and mobile computing is intensifying this problem. For the first time, this book brings together theories and methods which will help you to change and harness people's security behaviour.
Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.
Securing a windows Server 2003 enterprise network is hardly a N tW k small undertaking, but it becomes quite manageable if you approach it in an Nel. ork organized and systematic way. This includes configuring software, services, ...
Designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security, this work includes extensive end-of-chapter pedagogy to reinforce concepts as they are ...
This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources."
This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles.