Information security management principles
In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edit...
Saved in:
| Main Author | |
|---|---|
| Other Authors | , , |
| Format | Electronic eBook |
| Language | English |
| Published |
Swindon, U.K. :
BCS Learning & Development Ltd.,
2013.
|
| Subjects | |
| Online Access | Full text |
| ISBN | 9781780171760 1780171765 9781628702590 1628702591 1780171757 9781780171753 9781780171777 1780171773 9781780171784 1780171781 |
| Physical Description | 1 online resource (xvi, 208 pages) : illustrations |
Cover
| LEADER | 00000cam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | kn-ocn854569528 | ||
| 003 | OCoLC | ||
| 005 | 20240717213016.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 130715s2013 enka ob 001 0 eng d | ||
| 040 | |a E7B |b eng |e pn |c E7B |d OCLCQ |d OCLCO |d N$T |d KNOVL |d OCLCF |d COO |d YDXCP |d EBLCP |d UMI |d DEBSZ |d B24X7 |d OCLCO |d OCLCQ |d OCLCO |d TJC |d OCLCQ |d OCLCO |d Z5A |d ZCU |d MERUC |d OCLCQ |d OCLCA |d ICG |d CNNOR |d STF |d MERER |d CUY |d CEF |d ERL |d OCLCQ |d LVT |d AGLDB |d OCLCQ |d DKC |d OCLCQ |d CNCEN |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d SXB | ||
| 020 | |a 9781780171760 |q (electronic bk.) | ||
| 020 | |a 1780171765 |q (electronic bk.) | ||
| 020 | |a 9781628702590 |q (electronic bk.) | ||
| 020 | |a 1628702591 |q (electronic bk.) | ||
| 020 | |a 1780171757 | ||
| 020 | |a 9781780171753 | ||
| 020 | |a 9781780171777 |q (ePUB) | ||
| 020 | |a 1780171773 |q (ePUB) | ||
| 020 | |a 9781780171784 |q (Kindle) | ||
| 020 | |a 1780171781 |q (Kindle) | ||
| 020 | |z 9781780171753 | ||
| 024 | 8 | |a 9781780171753 | |
| 035 | |a (OCoLC)854569528 |z (OCoLC)851971957 |z (OCoLC)858312198 |z (OCoLC)907208076 |z (OCoLC)988807173 |z (OCoLC)1076625903 |z (OCoLC)1104501689 |z (OCoLC)1105770860 | ||
| 100 | 1 | |a Alexander, David |c (Information security practitioner) |1 https://id.oclc.org/worldcat/entity/E39PCjyBbQBttP9bYRTYMygmMP | |
| 245 | 1 | 0 | |a Information security management principles / |c Andy Taylor (editor), David Alexander, Amanda Finch, David Sutton. |
| 260 | |a Swindon, U.K. : |b BCS Learning & Development Ltd., |c 2013. | ||
| 300 | |a 1 online resource (xvi, 208 pages) : |b illustrations | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index. | ||
| 505 | 0 | |a Copyright; CONTENTS; LIST OF FIGURES AND TABLES; AUTHORS; ACKNOWLEDGEMENTS; ABBREVIATIONS; PREFACE; 1 INFORMATION SECURITY PRINCIPLES; CONCEPTS AND DEFINITIONS; THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 2 INFORMATION RISK; THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS; RISK MANAGEMENT; POINTERS FOR ACTIVITIES IN THIS CHAPTER; 3 INFORMATION SECURITY FRAMEWORK; ORGANISATIONS AND RESPONSIBILITIES; ORGANISATIONAL POLICY, STANDARDS AND PROCEDURES; INFORMATION SECURITY GOVERNANCE; INFORMATION SECURITY IMPLEMENTATION. | |
| 505 | 8 | |a Security incident managementlegal framework; security standards and procedures; pointers for activities in this chapter; 4 procedural and people security controls; people; user access controls; training and awareness; pointers for activities in this chapter; 5 technical security controls; protection from malicious software; networks and communications; external services; cloud computing; it infrastructure; pointers for activities in this chapter; 6 software development and life cycle; testing, audit and review; systems development and support; pointers for activities in this chapter. | |
| 505 | 8 | |a 7 physical and environmental securitylearning outcomes; general controls; physical security; technical security; procedural security; protection of equipment; processes to handle intruder alerts; clear screen and desk policy; moving property on and off site; procedures for secure disposal; security requirements in delivery and loading areas; pointers for activities in this chapter; 8 disaster recovery and business continuity management; learning outcomes; dr/bcp, risk assessment and impact analysis; writing and implementing plans; documentation, maintenance and testing. | |
| 505 | 8 | |a LINKS TO MANAGED SERVICE PROVISION AND OUTSOURCINGSECURE OFF-SITE STORAGE OF VITAL MATERIAL; INVOLVEMENT OF PERSONNEL, SUPPLIERS AND IT SYSTEMS PROVIDERS; SECURITY INCIDENT MANAGEMENT; COMPLIANCE WITH STANDARDS; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; 9 OTHER TECHNICAL ASPECTS; INVESTIGATIONS AND FORENSICS; ROLE OF CRYPTOGRAPHY; POINTERS FOR THE ACTIVITY IN THIS CHAPTER; APPENDIX A; GLOSSARY; INDEX; Back Cover. | |
| 506 | |a Plný text je dostupný pouze z IP adres počítačů Univerzity Tomáše Bati ve Zlíně nebo vzdáleným přístupem pro zaměstnance a studenty | ||
| 520 | |a In today's technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. This second edition includes the security of cloud-based resources. | ||
| 590 | |a Knovel |b Knovel (All titles) | ||
| 650 | 0 | |a Computer security |x Management. | |
| 650 | 0 | |a Data protection. | |
| 655 | 7 | |a elektronické knihy |7 fd186907 |2 czenas | |
| 655 | 9 | |a electronic books |2 eczenas | |
| 700 | 1 | |a Finch, Amanda. | |
| 700 | 1 | |a Sutton, David |c (Information security practitioner) |1 https://id.oclc.org/worldcat/entity/E39PCjqKvFbKgyXgbrRKCkcmv3 | |
| 700 | 1 | |a Taylor, Andy. | |
| 776 | 0 | 8 | |i Print version: |a Taylor, Andy. |t Information Security Management Principles. |d Swindon : BCS Learning & Development Limited, ©2013 |z 9781780171753 |
| 856 | 4 | 0 | |u https://proxy.k.utb.cz/login?url=https://app.knovel.com/hotlink/toc/id:kpISMPE001/information-security-management?kpromoter=marc |y Full text |