Information security fundamentals

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamen...

Descripción completa

Detalles Bibliográficos
Autor principal: Peltier, Thomas R. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: [Place of publication not identified] CRC Press 2017.
Boca Raton : [2014]
Edición:2nd ed
Colección:Gale eBooks
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628542206719
Tabla de Contenidos:
  • Front Cover; Contents; Acknowledgments; Introduction; Information Security Fundamentals; Editor; Contributors; Chapter 1: Developing Policies; Chapter 2: Organization of Information Security; Chapter 3: Cryptology; Chapter 4: Risk Management: The Facilitated Risk Analysis and Assessment Process; Chapter 5: Building and Maintaining an Effective Security Awareness Program; Chapter 6: Physical Security; Chapter 7: Disaster Recovery and Business Continuity Planning; Chapter 8: Continuity of Operations Planning; Chapter 9: Access Controls
  • Chapter 10: Information System Development, Acquisition, and MaintenanceChapter 11: Information Security Incident Management; Chapter 12: Asset Classification; Chapter 13: Threats to Information Security; Chapter 14: Information Security Policies: A Practitioner's View; Glossary; Appendix A: Facilitated Risk Analysis and Assessment Process (FRAAP); Appendix B: Business Impact Analysis; Back Cover