Information security fundamentals
"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program. Information Security Fundamen...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified]
CRC Press
2017.
Boca Raton : [2014] |
Edición: | 2nd ed |
Colección: | Gale eBooks
|
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009628542206719 |
Tabla de Contenidos:
- Front Cover; Contents; Acknowledgments; Introduction; Information Security Fundamentals; Editor; Contributors; Chapter 1: Developing Policies; Chapter 2: Organization of Information Security; Chapter 3: Cryptology; Chapter 4: Risk Management: The Facilitated Risk Analysis and Assessment Process; Chapter 5: Building and Maintaining an Effective Security Awareness Program; Chapter 6: Physical Security; Chapter 7: Disaster Recovery and Business Continuity Planning; Chapter 8: Continuity of Operations Planning; Chapter 9: Access Controls
- Chapter 10: Information System Development, Acquisition, and MaintenanceChapter 11: Information Security Incident Management; Chapter 12: Asset Classification; Chapter 13: Threats to Information Security; Chapter 14: Information Security Policies: A Practitioner's View; Glossary; Appendix A: Facilitated Risk Analysis and Assessment Process (FRAAP); Appendix B: Business Impact Analysis; Back Cover