Book description
Information Security Management, Second Edition arms students with answers to the most critical questions about the fields of cybersecurity. It provides students with references to more in-depth study in areas where they may need to specialize. The Second Edition covers operations—the job of day-to-day cybersecurity tasks—regulations, compliance, laws and policies, research and development, and the creation of software and cyber defenses for security initiatives. Finally, the text covers advanced R&D involved in strategic aspects of security developments for threats that lay on the horizon.
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication Page
- Contents
- Preface
- Acknowledgments
- About the Author
- CHAPTER 1 Introduction to Information and Cybersecurity
- CHAPTER 2 Information Security Departments and Roles
- CHAPTER 3 Actors and Practices
- CHAPTER 4 Corporations: Laws, Regulations, and Policies
- CHAPTER 5 Information Security Management
- CHAPTER 6 Assessing Threats and Vulnerabilities
- CHAPTER 7 Risk Assessments and Risk Management
- CHAPTER 8 Computer Architecture and Security Models
- CHAPTER 9 Security Policies and Managing Behaviors
- CHAPTER 10 Cryptography
-
CHAPTER 11 Network Security, Firewalls, IDS, and SeCM
- 11.1 Firewall Systems
- 11.2 Firewall Architecture
- 11.3 Cybermonitoring and Scanning Systems
-
11.4 Information and Cybersecurity Management
- 11.4.1 SeCM and CM
- 11.4.2 CM and Computer Security Procedures and Frameworks
- 11.4.3 Security Management Planning—System Level
- 11.4.4 Configuring to a Secure State
- 11.4.5 Managed Enterprises
- 11.4.6 Managed Legacy Systems
- 11.4.7 Extended Guidelines
- 11.4.8 Center for Internet Security Benchmarks
- 11.4.9 Maintaining the Secure State
- 11.4.10 Conducting a Security Impact Analysis
- 11.4.11 Certification and Accreditation
- CHAPTER SUMMARY
- IMPORTANT TERMS
- THINK ABOUT IT
- REFERENCES
-
CHAPTER 12 Information Security Horizons
- 12.1 Cybersecurity Analytics and Machine Learning
- 12.2 Game Theory and Predictive Models
- 12.3 Reasoning and Inference
- 12.4 Heuristics and AI Decision Systems
- 12.5 Heuristic Biases and Security Planning
- 12.6 Biologically Inspired Security and Adaptive Systems
- 12.7 Sociobiologically Inspired Systems—A Final Case
- CHAPTER SUMMARY
- IMPORTANT TERMS
- THINK ABOUT IT
- REFERENCES
- Appendix: Think About IT Answers
- Index
Product information
- Title: Information Security Management, 2nd Edition
- Author(s):
- Release date: October 2021
- Publisher(s): Jones & Bartlett Learning
- ISBN: 9781284211672
You might also like
book
Information Security Management Principles, 3rd Edition
In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to …
book
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information …
book
Cybersecurity Leadership Demystified
Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use cases …
book
Information Security Policies, Procedures, and Standards
This book supplies a blueprint on how to develop effective information security policies and procedures. It …