Cantitate/Preț
Produs

Enterprise Information Security: Information security for non-technical decision makers: MB Executive

Autor Mr Peter Gregory
en Limba Engleză Paperback – 7 aug 2002
Terrorist attacks against the United States, rumours of cyberterrorism, high-profile virulent worms such as NIMDA and Code Red - all of these have thrust information security to centre stage in the business world.
Information security is no longer the exclusive domain of IT security practitioners – now all business executives need to be familiar with the high level concepts and issues surrounding the security of their enterprise. Whilst many publications exist for security practitioners and technologists they offer little business case or contextual information to high-level decision-makers.
Written in user-friendly terms but using a vocabulary that security practitioners also understand, this briefing will enable you to get to grips with security issues so you can make informed decisions on threats and risks facing your business.
Contents include:
  • Executive summary
  • Security is on centre stage
  • Security concepts – the principles everyone needs to know
  • Security mechanisms – the components that protect the enterprise
  • Security policies – defining the standard of architecture and behaviour
  • Security requirement – defining the behaviour of systems and applications
  • Protecting corporate information beyond the corporate boundaries
  • Privacy
  • Conclusion
Citește tot Restrânge

Preț: 73669 lei

Preț vechi: 95680 lei
-23%

Puncte Express: 1105

Preț estimativ în valută:
14113 15323$ 12104£

Cartea nu se mai tipărește

Doresc să fiu notificat când acest titlu va fi disponibil:

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9780273661573
ISBN-10: 0273661574
Pagini: 168
Dimensiuni: 210 x 297 x 12 mm
Greutate: 0.47 kg
Ediția:1
Editura: Pearson Education
Colecția Financial Times/ Prentice Hall
Seria MB Executive

Locul publicării:Harlow, United Kingdom

Cuprins

List of tables
List of figures
Executive summary
Introduction
Security is on centre stage
  • The priority of information security
  • Impact of 2001 events
  • Proliferation of extranets
  • Insiders the real threat
  • Unprecedented dependence on information technology
  • Summary
Threats and vulnerabilities
  • Introduction
  • Threats
  • Vulnerabilities
  • Summary
Security fundamentals – the principles and the mechanisms behind them
  • Introduction
  • Identification and authentication
  • Authenticating other systems
  • Authorization
  • Access control
  • Encryption
  • Non-repudiation
  • Integrity
  • Audit
  • Availability
  • Security mechanisms work together
  • Summary
Security policies and requirements – defining the standard of architecture and behaviour
  • Introduction
  • What are information security policies?
  • Who writes security policies?
  • Audience
  • Policy development
  • Awareness
  • Enforcement and effectiveness
  • Summary
Security is about people’s behaviour
  • Introduction
  • Technology is not the solution
  • The ‘people threat’
  • Mitigating the threat
  • Trust
  • Summary
Protecting corporate information beyond the corporate boundaries
  • Introduction
  • The new world
  • Regaining control
  • Summary
Privacy
  • Introduction
  • What is personal information?
  • It’s all about trust
  • Privacy policy
  • How security supports privacy
  • Privacy certifications
  • Summary
Action items
  • Most important and urgent action items (Quadrant I)
  • Most important but less urgent action items (Quadrant II)
  • Important and urgent action items (Quadrant III)
  • Important and less urgent action items (Quadrant IV)
  • Epilogue
References/sources for additional information