LEADER 00000cam a2200541Ii 4500 003 OCoLC 005 20240129213017.0 006 m o d 007 cr cnu---unuuu 008 220326s2022 caua o 001 0 eng d 019 1305912503|a1306024037 020 9781484277997|q(electronic bk.) 020 1484277996|q(electronic bk.) 024 7 10.1007/978-1-4842-7799-7|2doi 029 1 AU@|b000071436174 035 (OCoLC)1306066021|z(OCoLC)1305912503|z(OCoLC)1306024037 037 9781484277997|bO'Reilly Media 040 EBLCP|beng|erda|epn|cEBLCP|dYDX|dORMDA|dOCLCO|dGW5XE |dEBLCP|dOCLCF|dUKAHL|dOCLCQ|dVLB|dOCLCO|dOCLCL 049 INap 082 04 005.8 082 04 005.8|223 099 eBook O'Reilly for Public Libraries 100 1 Viegas, Virgilio,|eauthor. 245 10 IT security controls :|ba guide to corporate standards and frameworks /|cVirgilio Viegas, Oben Kuyucu.|h[O'Reilly electronic resource] 264 1 Berkeley, CA :|bApress L. P.,|c[2022] 264 4 |c©2022 300 1 online resource (369 pages) :|billustrations (some color) 336 text|btxt|2rdacontent 337 computer|bc|2rdamedia 338 online resource|bcr|2rdacarrier 500 Includes index. 505 00 |tThe Cybersecurity Challenge --|tInternational security standards --|tInformation security frameworks --|tIT Security technical controls --|tCorporate information security processes and services --|tPeople --|tSecurity metrics --|tCase studies --|tSecurity testing and attack simulation tools. 520 Use this reference for IT security practitioners to get an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). To connect the book with the real world, a number of well- known case studies are featured to explain what went wrong with the biggest hacks of the decade, and which controls should have been in place to prevent them. The book also describes a set of well-known security tools available to support you. What You Will Learn Understand corporate IT security controls, including governance, policies, procedures, and security awareness Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans Understand technical IT security controls for unmanaged and managed devices, and perimeter controls Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more Who This Book Is For IT security managers, chief information security officers, information security practitioners, and IT auditors will use the book as a reference and support guide to conduct gap analyses and audits of their organizations' IT security controls implementations. 588 Description based upon print version of record. 590 O'Reilly|bO'Reilly Online Learning: Academic/Public Library Edition 650 0 Computer security. 650 2 Computer Security 650 6 Sécurité informatique. 650 7 Computer security|2fast 700 1 Kuyucu, Oben,|eauthor. 776 08 |iPrint version:|aViegas, Virgilio|tIT Security Controls |dBerkeley, CA : Apress L. P.,c2022|z9781484277980 856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https:// learning.oreilly.com/library/view/~/9781484277997/?ar |zAvailable on O'Reilly for Public Libraries 938 Askews and Holts Library Services|bASKH|nAH40170318 938 ProQuest Ebook Central|bEBLB|nEBL6938781 938 YBP Library Services|bYANK|n302806682 994 92|bJFN