相關主題
商品描述
Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that provide clear guidance on how to properly apply the new standards in conducting security audits and creating risk-driven information security programs.
An authoritative and practical classroom resource, Information Security Management: Concepts and Practice provides a general overview of security auditing before examining the various elements of the information security life cycle. It explains the ISO 17799 standard and walks readers through the steps of conducting a nominal security audit that conforms to the standard. The text also provides detailed guidance for conducting an in-depth technical security audit leading to certification against the 27001 standard. Topics addressed include cyber security, security risk assessments, privacy rights, HIPAA, SOX, intrusion detection systems, security testing activities, cyber terrorism, and vulnerability assessments.
This self-contained text is filled with review questions, workshops, and real-world examples that illustrate effective implementation and security auditing methodologies. It also includes a detailed security auditing methodology students can use to devise and implement effective risk-driven security programs that touch all phases of a computing environment—including the sequential stages needed to maintain virtually air-tight IS management systems that conform to the latest ISO standards.
商品描述(中文翻譯)
資訊安全無法有效管理,除非在資訊安全生命週期的所有階段中整合安全的方法和標準。儘管國際社會積極參與全球網路和資訊安全的安全標準制定,但目前可用的教科書卻很少,能夠提供如何正確應用新標準以進行安全審核和創建以風險為驅動的資訊安全計畫的明確指導。
作為一個權威且實用的課堂資源,《資訊安全管理:概念與實踐》提供了安全審核的一般概述,然後檢視資訊安全生命週期的各個元素。它解釋了ISO 17799標準,並引導讀者了解如何進行符合該標準的名義安全審核。該文本還提供了進行深入技術安全審核的詳細指導,以便獲得27001標準的認證。所涉及的主題包括網路安全、安全風險評估、隱私權、HIPAA、SOX、入侵檢測系統、安全測試活動、網路恐怖主義和脆弱性評估。
這本自成一體的文本充滿了複習問題、工作坊和現實世界的例子,這些例子說明了有效實施和安全審核方法論。它還包括一個詳細的安全審核方法論,學生可以利用這些方法來設計和實施有效的以風險為驅動的安全計畫,涵蓋計算環境的所有階段,包括維持幾乎無漏洞的資訊系統管理系統所需的連續階段,這些系統符合最新的ISO標準。