Information security fundamentals /

"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundament...

Full description

Bibliographic Details
Main Author: Peltier , Thomas R author
Format:
Language:eng
Published: Boca Raton, [Florida] : CRC Press, Taylor & Francis Group, [201
Subjects:
_version_ 1796751496472166400
author Peltier , Thomas R author
author_facet Peltier , Thomas R author
author_sort Peltier , Thomas R author
collection OCEAN
description "Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"-- Provided by publisher
first_indexed 2024-03-05T14:06:40Z
format
id KOHA-OAI-TEST:512103
institution Universiti Teknologi Malaysia - OCEAN
language eng
last_indexed 2024-03-05T14:06:40Z
publishDate [201
publisher Boca Raton, [Florida] : CRC Press, Taylor & Francis Group,
record_format dspace
spelling KOHA-OAI-TEST:5121032020-12-19T17:18:58ZInformation security fundamentals / Peltier , Thomas R author Boca Raton, [Florida] : CRC Press, Taylor & Francis Group,[2014]eng"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"-- Provided by publisherIncludes bibliographical references and index"Effective security rules and procedures do not exist for their own sake-they are put in place to protect critical assets, thereby supporting overall business objectives. Recognizing security as a business enabler is the first step in building a successful program.Information Security Fundamentals allows future security professionals to gain a solid understanding of the foundations of the field and the entire range of issues that practitioners must address. This book enables students to understand the key elements that comprise a successful information security program and eventually apply these concepts to their own efforts. The book examines the elements of computer security, employee roles and responsibilities, and common threats. It examines the need for management controls, policies and procedures, and risk analysis, and also presents a comprehensive list of tasks and objectives that make up a typical information protection program.The volume discusses organizationwide policies and their documentation, and legal and business requirements. It explains policy format, focusing on global, topic-specific, and application-specific policies. Following a review of asset classification, the book explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management. Information Security Fundamentals concludes by describing business continuity planning, including preventive controls, recovery strategies, and ways to conduct a business impact analysis"-- Provided by publisherPSZJBLComputer securityData protectionURN:ISBN:9781439810620 (pbk.)
spellingShingle Computer security
Data protection
Peltier , Thomas R author
Information security fundamentals /
title Information security fundamentals /
title_full Information security fundamentals /
title_fullStr Information security fundamentals /
title_full_unstemmed Information security fundamentals /
title_short Information security fundamentals /
title_sort information security fundamentals
topic Computer security
Data protection
work_keys_str_mv AT peltierthomasrauthor informationsecurityfundamentals