Flylib.com
Information Technology Security. Advice from Experts
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
Table of Contents
BackCover
IT Solutions Series - IT Security Advice from Experts
Preface
Chapter I: Executive Overview
Security as a Process
The Value of Information Assets
Security Challenges and Responsibilities
Section I: Governance Issues
Chapter II: Aligning Assurance Requirements, Countermeasures, and Business
What Do We Want ?
So What is an Information Assurance Requirement?
Defending Information in Depth ... in All Directions
The Architect
Enterprise Architecture: The Evolution of an Opportunity
Requirements, Means, and Architectures all Meet
Conclusions
Professional Accountability
Chapter III: Protecting Customer Provided Information
Defining Customer Provided Information
Vulnerabilities and Threats
Shareholder Wealth
Maintaining and Increasing the Customer Base
Professional Responsibility
Security is a Winless Game
Fine Line between Clever and Stupid
Seal of Approval
Legal Ramifications
Designing an Information Assurance Strategy
Protective Security Measures
Conclusions
Chapter IV: Global IT Risk Management Strategies
Scalability of Risk Management Processes
Risk Management is Everyone s Responsibility
People, Processes, Technology and the Hierarchy of Controls
Hierarchy of Controls Model
Common Terminology
Risk Management Model
Introduction to Key Terminology
Risk Management Process Model Concepts
Risk Identification
Identify Scope
Quantify Potential Reward
Quantify Risks
Business Impact
Analyze Risks
Assess Vulnerabilities
Identify Dimensions of Vulnerability
Assess Mitigation Practices
Identify Mitigation Categories
Measure Compliance
Trusting Trusted Systems
Verifying Digital Information Outside of the Organization
Summary
Section II: Architecture Issues
Chapter V: Architecture Issues
Building a Threat Matrix
Aligning Architectures to Service Level Agreements
Constructing Multi-Layer Protection Barriers
Revealing Internal Threats to IT Security Processes
Is Disaster Recovery Planning Important?
Summary
Section III: Technology Issues
Chapter VI: Wireless Information Security
Definitions
How Does Wireless LAN Work?
Wireless Practices
Trends
Vulnerabilities
Management Countermeasures
Implementation Countermeasures
Configuration Countermeasures
What is Next?
Defensive Enterprise Solutions
Follow-Up Procedures
Planning and Managing Data Obsolescence
Planning and Managing Data Backup and Recovery Protocols
Biometrics
SmartCards
Security System Verification
Summary
Chapter VII: Reference Materials
Computer Crime Statistics
Firewall Reference Sources
Glossary of Security Terms
Government Standards
Incident Response Centers
IT Security Professional Associations
Useful Security Web Sites
References
Index
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_K
Index_L
Index_M
Index_N
Index_P
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
List of Figures
List of Tables
Information Technology Security. Advice from Experts
ISBN: 1591402484
EAN: N/A
Year: 2004
Pages: 113
BUY ON AMAZON
FileMaker Pro 8: The Missing Manual
Format the Number/Date/Time/Graphic
Creating Related Records
Auto-Enter Calculations
Extending Calculations
Sorting Records
Making Sense of Change Management: A Complete Guide to the Models, Tools and Techniques of Organizational Change
Part I - The Underpinning Theory
Individual change
Part II - The Applications
Restructuring
Cultural change
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
The Internationalization of the Retail Supply Chain
Market Orientation and Supply Chain Management in the Fashion Industry
Fashion Logistics and Quick Response
Transforming Technologies: Retail Exchanges and RFID
Web Systems Design and Online Consumer Behavior
Chapter V Consumer Complaint Behavior in the Online Environment
Chapter VII Objective and Perceived Complexity and Their Impacts on Internet Communication
Chapter IX Extrinsic Plus Intrinsic Human Factors Influencing the Web Usage
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Chapter XVII Internet Markets and E-Loyalty
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Adding Shapes to Diagrams
Modifying Shape Connections
Exporting Timelines to Create Gantt Charts
Organizing Shapes in Office Layouts by Using Layers
Key Points
The Oracle Hackers Handbook: Hacking and Defending Oracle
Attacking the Authentication Process
Indirect Privilege Escalation
Defeating Virtual Private Databases
Attacking Oracle PL/SQL Web Applications
Appendix A Default Usernames and Passwords
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies