, ,

Information Security

Principles and Practices

Paperback Engels 2014 9780789753250
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Written by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends, from cloud and mobile security to BYOD and the latest compliance requirements. The authors present updated real-life case studies, review questions, and exercises throughout.

Specificaties

ISBN13:9780789753250
Taal:Engels
Bindwijze:Paperback

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Preface</p> <p><strong>Chapter 1:</strong> Why Study Information Security?</p> <p>Introduction</p> <p>The Growing Importance of IT Security and New Career Opportunities</p> <p> An Increase in Demand by Government and Private Industry</p> <p>Becoming an Information Security Specialist</p> <p> Schools Are Responding to Demands</p> <p> The Importance of a Multidisciplinary Approach</p> <p>Contextualizing Information Security</p> <p> Information Security Careers Meet the Needs of Business</p> <p>Summary</p> <p><strong>Chapter 2:</strong> Information Security Principles of Success</p> <p>Introduction</p> <p>Principle 1: There Is No Such Thing As Absolute Security</p> <p>Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability</p> <p> Integrity Models</p> <p> Availability Models</p> <p>Principle 3: Defense in Depth as Strategy</p> <p>Principle 4: When Left on Their Own, People Tend to Make the Worst Security Decisions</p> <p>Principle 5: Computer Security Depends on Two Types of Requirements: Functional and Assurance</p> <p>Principle 6: Security Through Obscurity Is Not an Answer</p> <p>Principle 7: Security = Risk Management</p> <p>Principle 8: The Three Types of Security Controls Are Preventative, Detective, and Responsive</p> <p>Principle 9: Complexity Is the Enemy of Security</p> <p>Principle 10: Fear, Uncertainty, and Doubt Do Not Work in Selling Security</p> <p>Principle 11: People, Process, and Technology Are All Needed to Adequately Secure a System or Facility</p> <p>Principle 12: Open Disclosure of Vulnerabilities Is Good for Security!</p> <p>Summary</p> <p><strong>Chapter 3:</strong> Certification Programs and the Common Body of Knowledge</p> <p>Introduction</p> <p>Certification and Information Security</p> <p>International Information Systems Security Certifications Consortium (ISC)2</p> <p>The Information Security Common Body of Knowledge</p> <p> Information Security Governance and Risk Management</p> <p> Security Architecture and Design</p> <p> Business Continuity and Disaster Recovery Planning</p> <p> Legal Regulations, Investigations, and Compliance</p> <p> Physical (Environmental) Security</p> <p> Operations Security</p> <p> Access Control</p> <p> Cryptography</p> <p> Telecommunications and Network Security</p> <p> Software Development Security</p> <p>Other Certificate Programs in the IT Security Industry</p> <p> Certified Information Systems Auditor</p> <p> Certified Information Security Manager</p> <p> Certified in Risk and Information Systems Control</p> <p> Global Information Assurance Certifications</p> <p> (ISC)2 Specialization Certificates</p> <p> CCFP: Certified Cyber Forensics Professional</p> <p> HCISPP: HealthCare Information Security and Privacy Practitioner</p> <p> Vendor-Specific and Other Certification Programs</p> <p>Summary</p> <p><strong>Chapter 4:</strong> Governance and Risk Management</p> <p>Introduction</p> <p>Security Policies Set the Stage for Success</p> <p>Understanding the Four Types of Policies</p> <p> Programme-Level Policies</p> <p> Programme-Framework Policies</p> <p> Issue-Specific Policies</p> <p> System-Specific Policies</p> <p>Developing and Managing Security Policies</p> <p> Security Objectives</p> <p> Operational Security</p> <p> Policy Implementation</p> <p>Providing Policy Support Documents</p> <p> Regulations</p> <p> Standards and Baselines</p> <p> Guidelines</p> <p> Procedures</p> <p>Suggested Standards Taxonomy</p> <p> Asset and Data Classification</p> <p> Separation of Duties</p> <p> Employment Hiring Practices</p> <p> Risk Analysis and Management</p> <p> Education, Training, and Awareness</p> <p>Who Is Responsible for Security?</p> <p>Summary</p> <p><strong>Chapter 5:</strong> Security Architecture and Design</p> <p>Introduction</p> <p>Defining the Trusted Computing Base</p> <p> Rings of Trust</p> <p>Protection Mechanisms in a TCB</p> <p>System Security Assurance Concepts</p> <p> Goals of Security Testing</p> <p> Formal Security Testing Models</p> <p>The Trusted Computer Security Evaluation Criteria</p> <p> Division D: Minimal Protection</p> <p> Division C: Discretionary Protection</p> <p> Division B: Mandatory Protection</p> <p> Division A: Verified Protection</p> <p> The Trusted Network Interpretation of the TCSEC</p> <p> The Information Technology Security Evaluation Criteria</p> <p> Comparing ITSEC to TCSEC</p> <p> ITSEC Assurance Classes</p> <p>The Canadian Trusted Computer Product Evaluation Criteria</p> <p>The Federal Criteria for Information Technology Security</p> <p>The Common Criteria</p> <p> Protection Profile Organization</p> <p> Security Functional Requirements</p> <p> Evaluation Assurance Levels</p> <p>The Common Evaluation Methodology</p> <p>Confidentiality and Integrity Models</p> <p> Bell-LaPadula Model</p> <p> Biba Integrity Model</p> <p> Advanced Models</p> <p>Summary</p> <p><strong>Chapter 6:</strong> Business Continuity Planning and Disaster Recovery Planning</p> <p>Introduction</p> <p>Overview of the Business Continuity Plan and Disaster Recovery Plan</p> <p> Why the BCP Is So Important</p> <p> Types of Disruptive Events</p> <p> Defining the Scope of the BCP</p> <p> Creating the Business Impact Analysis</p> <p>Disaster Recovery Planning</p> <p> Identifying Recovery Strategies</p> <p> Understanding Shared-Site Agreements</p> <p> Using Alternate Sites</p> <p> Making Additional Arrangements</p> <p> Testing the DRP</p> <p>Summary</p> <p><strong>Chapter 7:</strong> Law, Investigations, and Ethics</p> <p>Introduction</p> <p>Types of Computer Crime</p> <p>How Cybercriminals Commit Crimes</p> <p>The Computer and the Law</p> <p> Legislative Branch of the Legal System</p> <p> Administrative Branch of the Legal System</p> <p> Judicial Branch of the Legal System</p> <p>Intellectual Property Law</p> <p> Patent Law</p> <p> Trademarks</p> <p> Trade Secrets</p> <p>Privacy and the Law</p> <p> International Privacy Issues</p> <p> Privacy Laws in the United States</p> <p>Computer Forensics</p> <p>The Information Security Professional’s Code of Ethics</p> <p>Other Ethics Standards</p> <p> Computer Ethics Institute</p> <p> Internet Activities Board: Ethics and the Internet</p> <p> Code of Fair Information Practices</p> <p>Summary</p> <p><strong>Chapter 8:</strong> Physical Security Control</p> <p>Introduction</p> <p>Understanding the Physical Security Domain</p> <p> Physical Security Threats</p> <p> Providing Physical Security</p> <p>Summary</p> <p><strong>Chapter 9:</strong> Operations Security</p> <p>Introduction</p> <p>Operations Security Principles</p> <p>Operations Security Process Controls</p> <p>Operations Security Controls in Action</p> <p> Software Support</p> <p> Configuration and Change Management</p> <p> Backups</p> <p> Media Controls</p> <p> Documentation</p> <p> Maintenance</p> <p> Interdependencies</p> <p>Summary</p> <p><strong>Chapter 10:</strong> Access Control Systems and Methodology</p> <p>Introduction</p> <p>Terms and Concepts</p> <p> Identification</p> <p> Authentication</p> <p> Least Privilege (Need to Know)</p> <p> Information Owner</p> <p> Discretionary Access Control</p> <p> Access Control Lists</p> <p> Mandatory Access Control</p> <p> Role-Based Access Control</p> <p>Principles of Authentication</p> <p> The Problems with Passwords</p> <p> Multifactor Authentication</p> <p>Biometrics</p> <p>Single Sign-On</p> <p> Kerberos</p> <p> Federated Identities</p> <p>Remote User Access and Authentication</p> <p> Remote Access Dial-In User Service</p> <p> Virtual Private Networks</p> <p>Summary</p> <p><strong>Chapter 11:</strong> Cryptography</p> <p>Introduction</p> <p>Applying Cryptography to Information Systems</p> <p>Basic Terms and Concepts</p> <p>Strength of Cryptosystems</p> <p> Cryptosystems Answer the Needs of Today’s E-Commerce</p> <p> The Role of Keys in Cryptosystems</p> <p>Putting the Pieces to Work</p> <p> Digesting Data</p> <p> Digital Certificates</p> <p>Examining Digital Cryptography</p> <p> Hashing Functions</p> <p> Block Ciphers</p> <p> Implementations of PPK Cryptography</p> <p>Summary</p> <p><strong>Chapter 12:</strong> Telecommunications, Network, and Internet Security</p> <p>Introduction</p> <p>An Overview of Network and Telecommunications Security</p> <p>Network Security in Context</p> <p>The Open Systems Interconnection Reference Model</p> <p> The Protocol Stack</p> <p> The OSI Reference Model and TCP/IP</p> <p> The OSI Model and Security</p> <p>Data Network Types</p> <p> Local Area Networks</p> <p> Wide Area Networks</p> <p> Internet</p> <p> Intranet</p> <p> Extranet</p> <p>Protecting TCP/IP Networks</p> <p> Basic Security Infrastructures</p> <p> Routers</p> <p> Firewalls</p> <p> Intrusion Detection Systems</p> <p> Intrusion Prevention Systems</p> <p>Virtual Private Networks</p> <p>IPSec</p> <p> Encapsulating Security Protocol</p> <p> Security Association</p> <p> Internet Security Association and Key Management Protocol</p> <p> Security Policies</p> <p> IPSec Key Management</p> <p> Applied VPNs</p> <p>Cloud Computing</p> <p>Summary</p> <p><strong>Chapter 13:</strong> Software Development Security</p> <p>Introduction</p> <p>The Practice of Software Engineering</p> <p>Software Development Life Cycles</p> <p>Don’t Bolt Security On–Build It In</p> <p> Catch Problems Sooner Rather Than Later</p> <p> Requirements Gathering and Analysis</p> <p> Systems Design and Detailed Design</p> <p>Design Reviews</p> <p> Development (Coding) Phase</p> <p> Testing</p> <p> Deployment</p> <p> Security Training</p> <p>Measuring the Secure Development Program</p> <p> Open Software Assurance Maturity Model (OpenSAMM)</p> <p> Building Security in Maturity Model (BSIMM)</p> <p>Summary</p> <p><strong>Chapter 14:</strong> Securing the Future</p> <p>Introduction</p> <p>Operation Eligible Receiver</p> <p>Carders, Account Takeover, and Identity Theft</p> <p> Some Definitions</p> <p> ZeuS Banking Trojan</p> <p> Phishing and Spear Phishing</p> <p> Other Trends in Internet (In)Security</p> <p> The Year (Decade?) of the Breach</p> <p>The Rosy Future for InfoSec Specialists</p> <p>Summary</p> <p><strong>Appendix A:</strong> Common Body of Knowledge</p> <p>Access Control</p> <p>Telecommunications and Network Security</p> <p>Information Security Governance and Risk Management</p> <p>Software Development Security</p> <p>Cryptography</p> <p>Security Architecture and Design</p> <p>Operations Security</p> <p>Business Continuity and Disaster Recovery Planning</p> <p>Legal Regulations, Investigations, and Compliance</p> <p>Physical (Environmental) Security</p> <p><strong>Appendix B:</strong> Security Policy and Standards Taxonomy</p> <p><strong>Appendix C:</strong> Sample Policies</p> <p>Sample Computer Acceptable Use Policy</p> <p> 1.0.0 Acceptable Use Policy</p> <p>Sample Email Use Policy</p> <p> 1.0.0 Email Use Policy</p> <p>Sample Password Policy</p> <p> 1.0.0 Password Policy</p> <p>Sample Wireless (WiFi) Use Policy</p> <p> 1.0.0 Wireless Communication Policy</p> <p><strong>Appendix D:</strong> HIPAA Security Rule Standards</p> <p>HIPAA Security Standards</p> <p>Administrative Procedures</p> <p>Physical Safeguards</p> <p>Technical Security Services</p> <p>Technical Security Mechanisms</p> <p>9780789753250 TOC 5/7/2014</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Information Security