Enterprise Information Security: Information security for non-technical decision makers: MB Executive
Autor Mr Peter Gregoryen Limba Engleză Paperback – 7 aug 2002
Information security is no longer the exclusive domain of IT security practitioners – now all business executives need to be familiar with the high level concepts and issues surrounding the security of their enterprise. Whilst many publications exist for security practitioners and technologists they offer little business case or contextual information to high-level decision-makers.
Written in user-friendly terms but using a vocabulary that security practitioners also understand, this briefing will enable you to get to grips with security issues so you can make informed decisions on threats and risks facing your business.
Contents include:
- Executive summary
- Security is on centre stage
- Security concepts – the principles everyone needs to know
- Security mechanisms – the components that protect the enterprise
- Security policies – defining the standard of architecture and behaviour
- Security requirement – defining the behaviour of systems and applications
- Protecting corporate information beyond the corporate boundaries
- Privacy
- Conclusion
Preț: 736.69 lei
Preț vechi: 956.80 lei
-23%
Puncte Express: 1105
Preț estimativ în valută:
141.13€ • 153.23$ • 121.04£
141.13€ • 153.23$ • 121.04£
Cartea nu se mai tipărește
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780273661573
ISBN-10: 0273661574
Pagini: 168
Dimensiuni: 210 x 297 x 12 mm
Greutate: 0.47 kg
Ediția:1
Editura: Pearson Education
Colecția Financial Times/ Prentice Hall
Seria MB Executive
Locul publicării:Harlow, United Kingdom
ISBN-10: 0273661574
Pagini: 168
Dimensiuni: 210 x 297 x 12 mm
Greutate: 0.47 kg
Ediția:1
Editura: Pearson Education
Colecția Financial Times/ Prentice Hall
Seria MB Executive
Locul publicării:Harlow, United Kingdom
Cuprins
List of tables
List of figures
Executive summary
Introduction
Security is on centre stage
List of figures
Executive summary
Introduction
Security is on centre stage
- The priority of information security
- Impact of 2001 events
- Proliferation of extranets
- Insiders the real threat
- Unprecedented dependence on information technology
- Summary
- Introduction
- Threats
- Vulnerabilities
- Summary
- Introduction
- Identification and authentication
- Authenticating other systems
- Authorization
- Access control
- Encryption
- Non-repudiation
- Integrity
- Audit
- Availability
- Security mechanisms work together
- Summary
- Introduction
- What are information security policies?
- Who writes security policies?
- Audience
- Policy development
- Awareness
- Enforcement and effectiveness
- Summary
- Introduction
- Technology is not the solution
- The ‘people threat’
- Mitigating the threat
- Trust
- Summary
- Introduction
- The new world
- Regaining control
- Summary
- Introduction
- What is personal information?
- It’s all about trust
- Privacy policy
- How security supports privacy
- Privacy certifications
- Summary
- Most important and urgent action items (Quadrant I)
- Most important but less urgent action items (Quadrant II)
- Important and urgent action items (Quadrant III)
- Important and less urgent action items (Quadrant IV)
- Epilogue