Skip to content
You are not logged in |Login  
     
Limit search to available items
Book Cover
Bestseller
BestsellerE-Book
Author Mooney, Tom.

Title Information Security A Practical Guide : Bridging the gap between IT and management.

Publication Info. Ely : IT Governance Ltd, 2015.

Copies

Location Call No. Status
 Rocky Hill - Downloadable Materials  EBSCO Ebook    Downloadable
Rocky Hill cardholders click here to access this title from EBSCO
Description 1 online resource (134 pages)
Note Print version record.
Contents Cover; Title; Copyright; Contents; Chapter 1: Day One as a Security Professional; Chapter Overview; Objectives; Your First Day; Confidentiality, Integrity and Availability (CIA); Getting to Know the Business; Key IT Personnel; What is the Security Culture?; Identifying the Gaps in Security; Chapter 2: Business Impact of Breaches; Chapter Overview; Objectives; How to Assess the Impact; Data Types; Impacts; Reputational Damage; Personal Impact; Contractual Impact; Financial Impact; Legal Impacts; Chapter 3: Business Risk Appetite; Chapter Overview; Objectives; Risk Appetite; Risk Treatments.
Chapter 4: ThreatsChapter Overview; Objectives; Types of Threats; Hackers; Malware Writers; Script Kiddies; Journalists; Criminals; Physical Intruder; Researchers; Hacktivists; Disgruntled Employees; Chapter 5: Quick and Dirty Risk Assessment; Chapter Overview; Objectives; Identifying Risks; Defining the Risk Level; Risk Table; Realigning the Risk Level; Chapter 6: Getting Buy-in From Your Peers; Chapter Overview; Objectives; Points of Contact with your Peers; How to Engage with your Peers; Chapter 7: Documenting the System For Everyone; Chapter Overview; Objectives; Setting the Scene.
EntitiesService Overview; Adding Boundaries; Showing Information Flow; Adding the Threats; Chapter 8: Mapping Data in the System; Chapter Overview; Objectives; Mapping Data; Chapter 9: Penetration Testing; Chapter Overview; Objectives; Types of Penetration Test; Scoping the test; Trusting the Testers; Implementing Fixes; Chapter 10: Information Security Policy; Chapter Overview; Objectives; The Advantages of Security Policies; Giving Your Policies Teeth; Key Security Policies; Ways of Ensuring Your Policy is Read; ITG Resources.
Summary Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
Subject Computer security -- Management.
Information technology -- Management.
Data protection -- Law and legislation.
Data protection -- Law and legislation -- European Union countries.
Privacy, Right of.
Privacy, Right of -- European Union countries.
SOCIAL SCIENCE -- Criminology.
COMPUTERS -- General.
Computer security -- Management. (OCoLC)fst00872493
Information technology -- Management. (OCoLC)fst00973112
Other Form: Print version: Mooney, Tom. Information Security A Practical Guide : Bridging the gap between IT and management. Ely : IT Governance Ltd, ©2015 9781849287401
ISBN 9781849287418 (electronic bk.)
1849287414 (electronic bk.)
-->
Add a Review