Security Controls for Sarbanes-Oxley Section 404 IT Compliance : Authorization, Authentication, and Access
暫譯: 薩班斯-奧克斯利法案第404條 IT 合規性安全控制:授權、身份驗證與存取
Dennis C. Brewer
買這商品的人也買了...
-
$1,029Fundamentals of Data Structures in C
-
$750$638 -
$590$466 -
$750$593 -
$490$382 -
$580$493 -
$350$277 -
$180$153 -
$490$387 -
$480$379 -
$490$382 -
$890$757 -
$780$663 -
$660$521 -
$680$537 -
$3,026$2,875 -
$520$411 -
$650$507 -
$850$723 -
$680$537 -
$680$537 -
$780$616 -
$720$569 -
$720$569 -
$780$616
相關主題
商品描述
Description:
- The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets-all of which depend heavily on installing or improving information security technology
- Offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security
- Addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta-directories, identity provisioning, authentication, and access control
- A companion book to Manager's Guide to the Sarbanes-Oxley Act (0-471-56975-5) and How to Comply with Sarbanes-Oxley Section 404 (0-471-65366-7)
Table of Contents:
About the Author.
Acknowledgments.
Introduction.
Chapter 1: The Role of Information Technology Architecture in Information Systems Design.
Chapter 2: Understanding Basic Concepts of Privacy and Data Protection.
Chapter 3: Defining and Enforcing Architecture.
Chapter 4: Combining External Forces, Internal Influences, and IT Assets.
Chapter 5: Simplifying the Security Matrix.
Chapter 6: Developing Directory-Based Access Control Strategies.
Chapter 7: Integrating the Critical Elements.
Chapter 8: Engineering Privacy Protection into Systems and Applications.
Chapter 9: The Value of Data Inventory and Data Labeling.
Chapter 10: Putting It All Together in the Web Applications Environment.
Chapter 11: Why Federated Identity Schemes Fail.
Chapter 12: A Pathway to Universal Two-Factor Authentication.
Appendix A: WWW Resources for Authentication, Authorization, and Access Control News and Information.
Appendix B: Important Access Control and Security Terms.
Appendix C: Critical Success Factors for Controls Design.
Appendix D: Sample Policy Statements for Compulsory Access and Security Controls.
Appendix E: Documentation Examples.
Appendix F: Sample Job Description for Directory Engineer/Schema Architect.
Index.
商品描述(中文翻譯)
**描述:**
- 《薩班斯-奧克斯利法案》要求上市公司實施對財務報告、運營和資產的內部控制,這些都在很大程度上依賴於安裝或改善資訊安全技術。
- 深入探討為何網路必須設置某些身份驗證計算機科學協議(計算機之間通訊的規則),以保證安全性。
- 討論設計和創建一個整合身份管理、元目錄、身份供應、身份驗證和訪問控制所需的關鍵概念和技能。
- 本書是《薩班斯-奧克斯利法案管理者指南》(0-471-56975-5)和《如何遵守薩班斯-奧克斯利法案第404條》(0-471-65366-7)的配套書籍。
**目錄:**
- 關於作者。
- 致謝。
- 介紹。
- 第1章:資訊技術架構在資訊系統設計中的角色。
- 第2章:理解隱私和數據保護的基本概念。
- 第3章:定義和執行架構。
- 第4章:結合外部力量、內部影響和IT資產。
- 第5章:簡化安全矩陣。
- 第6章:開發基於目錄的訪問控制策略。
- 第7章:整合關鍵元素。
- 第8章:將隱私保護工程化到系統和應用中。
- 第9章:數據清單和數據標籤的價值。
- 第10章:在網路應用環境中整合所有內容。
- 第11章:為何聯邦身份方案失敗。
- 第12章:通往通用雙因素身份驗證的途徑。
- 附錄A:身份驗證、授權和訪問控制新聞與資訊的WWW資源。
- 附錄B:重要的訪問控制和安全術語。
- 附錄C:控制設計的關鍵成功因素。
- 附錄D:強制訪問和安全控制的範本政策聲明。
- 附錄E:文檔範例。
- 附錄F:目錄工程師/架構師的職位描述範本。
- 索引。