Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Rhodes-Ousley, Mark.

Title Information security : the complete reference / Mark Rhodes-Ousley. [O'Reilly electronic resource]

Edition 2nd ed.
Imprint New York : McGraw Hill Education, ©2013.
QR Code
Description 1 online resource (1 volume) : illustrations
text file
Series The Complete Reference Ser.
The Complete Reference Ser.
Note Includes index.
Bibliography Includes bibliographical references and index.
Contents Cover -- About the Author -- Title Page -- Copyright Page -- Contents at a Glance -- Contents -- Preface -- Acknowledgments -- Introduction -- Part I: Foundations -- Chapter 1: Information Security Overview -- The Importance of Information Protection -- The Evolution of Information Security -- Justifying Security Investment -- Business Agility -- Cost Reduction -- Portability -- Security Methodology -- How to Build a Security Program -- Authority -- Framework -- Assessment -- Planning -- Action -- Maintenance -- The Impossible Job -- The Weakest Link -- Strategy and Tactics
Business Processes vs. Technical Controls -- Summary -- References -- Chapter 2: Risk Analysis -- Threat Definition -- Threat Vectors -- Threat Sources and Targets -- Types of Attacks -- Malicious Mobile Code -- Advanced Persistent Threats (APTs) -- Manual Attacks -- Risk Analysis -- Summary -- References -- Chapter 3: Compliance with Standards, Regulations, and Laws -- Information Security Standards -- COBIT -- ISO 27000 Series -- NIST -- Regulations Affecting Information Security Professionals -- The Duty of Care -- Gramm-Leach-Bliley Act (GLBA) -- Sarbanes-Oxley Act
HIPAA Privacy and Security Rules -- NERC CIP -- PCI DSS: Payment Card Industry Data Security Standard -- Laws Affecting Information Security Professionals -- Hacking Laws -- Electronic Communication Laws -- Other Substantive Laws -- Summary -- References -- Chapter 4: Secure Design Principles -- The CIA Triad and Other Models -- Confidentiality -- Integrity -- Availability -- Additional Concepts -- Defense Models -- The Lollipop Model -- The Onion Model -- Zones of Trust -- Best Practices for Network Defense -- Secure the Physical Environment -- Harden the Operating System -- Keep Patches Updated
Use an Antivirus Scanner (with Real-Time Scanning) -- Use Firewall Software -- Secure Network Share Permissions -- Use Encryption -- Secure Applications -- Back Up the System -- Implement ARP Poisoning Defenses -- Create a Computer Security Defense Plan -- Summary -- References -- Chapter 5: Security Policies, Standards, Procedures, and Guidelines -- Security Policies -- Security Policy Development -- Security Policy Contributors -- Security Policy Audience -- Policy Categories -- Frameworks -- Security Awareness -- Importance of Security Awareness -- Objectives of an Awareness Program
Increasing Effectiveness -- Implementing the Awareness Program -- Enforcement -- Policy Enforcement for Vendors -- Policy Enforcement for Employees -- Software-Based Enforcement -- Example Security Policy Topics -- Acceptable Use Policies -- Computer Policies -- Network Policies -- Data Privacy Policies -- Data Integrity Policies -- Personnel Management Policies -- Security Management Policies -- Physical Security Policies -- Security Standards -- Security Standard Example -- Security Procedures -- Security Procedure Example -- Security Guidelines -- Security Guideline Example
Summary Explaining how to build a holistic security program based on proven methodology; risk analysis; compliance; and business needs; this comprehensive book offers vendor-neutral details on all aspects of information protection; with an eye toward the evolving threat landscape. -- Edited summary from book.
Language English.
Subject Computer networks -- Security measures.
Computer security.
Computer Security
Réseaux d'ordinateurs -- Sécurité -- Mesures.
Sécurité informatique.
Computer networks -- Security measures
Computer security
Other Form: Print version: Rhodes-Ousley, Mark Information Security: the Complete Reference, Second Edition : McGraw-Hill Education,c2013
ISBN 9780071784368 (electronic bk.)
0071784365 (electronic bk.)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information