Today, when most companies and government agencies rely on computer networks to store and manage their organizations’ data, it is essential that measures are put in place to secure those networks and keep them functioning optimally. Network administrators need to define their security management systems to cover all parts of their computer and network resources. With a plethora of storage devices, including iPads, Android Tablets, USB drives, watches, televisions, Digital Video Recorders, smart phones, apple T.V. appliances, Xbox’s, and household appliances, the management becomes even more difficult. This chapter focuses on security management systems: Which are sets of policies put place by an organization to maintain the security of their computer and network resources. These policies are based on the types of resources that need to be secured, and they depend on the organization. Some groups of policies can be applied to entire industries; others are specific to an individual organization. A security management system starts as a set of policies that dictate the way in which computer resources can be used. The policies are then implemented by the organization’s technical departments and enforced. This can be easy for smaller organizations but can require a team for larger international organizations that have thousands of business processes. Either way, measures need to be put in place to prevent, respond to, and fix security issues that arise in an organization. Standards that were in place ten years ago may not be adequate for current business practices. As an example a strong password may have included less than 8 characters, while modern computers can easily break the password utilizing brute force or rainbow table methods.
Web Security : How Much Is Enough ? " Datamation ( January 1997 ) . Rubin , A. D .; Geer , D .; and Ranum , M. Web Security Sourcebook . New York : John Wiley and Sons , 1997 . Rubin , Aviel and Geer , Daniel . " A Survey of Web ...
Sheila Frankel, Bernard Eydt, Les Owens Karen, Scarfone, NIST Special Publication 800À97: “Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i,” Recommendations of the National Institute of Standards and Technology, ...
This book compels information security professionals to think differently about concepts of risk management in order to be more effective.
[ 4 ] Wilson , M. , et al . , " Information Technology Security Training Requirements : A Role- and Performance - Based Model : Part 1 — Document , " September 2003 , http://csrc.nist.gov/publications/nistpubs/800-16/800-16.pdf .
The explosion in social networking and mobile computing is intensifying this problem. For the first time, this book brings together theories and methods which will help you to change and harness people's security behaviour.
Beginning with the foundational and technical components of information security, this edition then focuses on access control models, information security governance, and information security program assessment and metrics.
Designed for senior and graduate-level business and information systems students who want to learn the management aspects of information security, this work includes extensive end-of-chapter pedagogy to reinforce concepts as they are ...
Securing a windows Server 2003 enterprise network is hardly a N tW k small undertaking, but it becomes quite manageable if you approach it in an Nel. ork organized and systematic way. This includes configuring software, services, ...
This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources."
This is the basis for a focused and methodologically structured approach that presents "the big picture" of information systems security and privacy, while targeting managers and technical profiles.