Book description
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A compromise has to be struck between security of information and its availability. This book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner. The second edition has been expanded to include the security of cloud-based resources. The remainder of the contents have been reviewed and reordered to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.
Table of contents
- FRONT COVER
- BCS, THE CHARTERED INSTITUTE FOR IT
- TITLE PAGE
- COPYRIGHT PAGE
- CONTENTS
- LIST OF FIGURES AND TABLES
- AUTHORS
- ACKNOWLEDGEMENTS
- ABBREVIATIONS
- PREFACE
- 1. INFORMATION SECURITY PRINCIPLES
- 2. INFORMATION RISK
- 3. INFORMATION SECURITY FRAMEWORK
- 4. PROCEDURAL AND PEOPLE SECURITY CONTROLS
- 5. TECHNICAL SECURITY CONTROLS
- 6. SOFTWARE DEVELOPMENT AND LIFE CYCLE
-
7. PHYSICAL AND ENVIRONMENTAL SECURITY
- Learning outcomes
- General controls
- Physical security
- Technical security
- Procedural security
- Protection of equipment
- Processes to handle intruder alerts
- Clear screen and desk policy
- Moving property on and off site
- Procedures for secure disposal
- Security requirements in delivery and loading areas
- Pointers for activities in this chapter
-
8. DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT
- Learning outcomes
- DR/BCP, risk assessment and impact analysis
- Writing and implementing plans
- Documentation, maintenance and testing
- Links to managed service provision and outsourcing
- Secure off-site storage of vital material
- Involvement of personnel, suppliers and IT systems providers
- Security incident management
- Compliance with standards
- Pointers for the activity in this chapter
- 9. OTHER TECHNICAL ASPECTS
- APPENDIX A
- GLOSSARY
- BACK COVER
Product information
- Title: Information Security Management Principles - Second edition
- Author(s):
- Release date: June 2013
- Publisher(s): BCS Learning & Development Limited
- ISBN: 9781780171753
You might also like
book
Information Security Management Principles, 3rd Edition
In today’s technology-driven environment there is an ever-increasing demand for information delivery. A compromise has to …
book
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies
Best practices for protecting critical data and systems Information Assurance Handbook: Effective Computer Security and Risk …
book
Implementing an Information Security Management System: Security Management Based on ISO 27001 Guidelines
Discover the simple steps to implementing information security standards using ISO 27001, the most popular information …
book
IT Security Risk Control Management: An Audit Preparation Plan
Follow step-by-step guidance to craft a successful security program. You will identify with the paradoxes of …