000 | 03785nam a22004573i 4500 | ||
---|---|---|---|
001 | EBC2048580 | ||
003 | MiAaPQ | ||
005 | 20240729123627.0 | ||
006 | m o d | | ||
007 | cr cnu|||||||| | ||
008 | 240724s2015 xx o ||||0 eng d | ||
020 |
_a9781849287425 _q(electronic bk.) |
||
020 | _z9781849287401 | ||
035 | _a(MiAaPQ)EBC2048580 | ||
035 | _a(Au-PeEL)EBL2048580 | ||
035 | _a(CaPaEBR)ebr11078153 | ||
035 | _a(OCoLC)914151232 | ||
040 |
_aMiAaPQ _beng _erda _epn _cMiAaPQ _dMiAaPQ |
||
050 | 4 | _aQA76.9.A25 .M666 2015 | |
082 | 0 | _a658.478 | |
100 | 1 | _aMooney, Tom. | |
245 | 1 | 0 |
_aInformation Security a Practical Guide : _bBridging the Gap Between IT and Management. |
250 | _a1st ed. | ||
264 | 1 |
_aEly : _bIT Governance Ltd, _c2015. |
|
264 | 4 | _c©2015. | |
300 | _a1 online resource (116 pages) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aCover -- Title -- Copyright -- Contents -- Introduction -- Chapter 1: Day One as a Security Professional -- Chapter Overview -- Objectives -- Your First Day -- Confidentiality, Integrity and Availability (CIA) -- Getting to Know the Business -- Key IT Personnel -- What is the Security Culture? -- Identifying the Gaps in Security -- Chapter 2: Business Impact of Breaches -- Chapter Overview -- Objectives -- How to Assess the Impact -- Data Types -- Impacts -- Reputational Damage -- Personal Impact -- Contractual Impact -- Financial Impact -- Legal Impacts -- Chapter 3: Business Risk Appetite -- Chapter Overview -- Objectives -- Risk Appetite -- Risk Treatments -- Chapter 4: Threats -- Chapter Overview -- Objectives -- Types of Threats -- Hackers -- Malware Writers -- Script Kiddies -- Journalists -- Criminals -- Physical Intruder -- Researchers -- Hacktivists -- Disgruntled Employees -- Chapter 5: Quick and Dirty Risk Assessment -- Chapter Overview -- Objectives -- Identifying Risks -- Defining the Risk Level -- Risk Table -- Realigning the Risk Level -- Chapter 6: Getting Buy-in From Your Peers -- Chapter Overview -- Objectives -- Points of Contact with your Peers -- How to Engage with your Peers -- Chapter 7: Documenting the System For Everyone -- Chapter Overview -- Objectives -- Setting the Scene -- Entities -- Service Overview -- Adding Boundaries -- Showing Information Flow -- Adding the Threats -- Chapter 8: Mapping Data in the System -- Chapter Overview -- Objectives -- Mapping Data -- Chapter 9: Penetration Testing -- Chapter Overview -- Objectives -- Types of Penetration Test -- Scoping the test -- Trusting the Testers -- Implementing Fixes -- Chapter 10: Information Security Policy -- Chapter Overview -- Objectives -- The Advantages of Security Policies -- Giving Your Policies Teeth -- Key Security Policies. | |
505 | 8 | _aWays of Ensuring Your Policy is Read -- ITG Resources. | |
520 | _aProvides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole. | ||
588 | _aDescription based on publisher supplied metadata and other sources. | ||
590 | _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. | ||
650 | 0 | _aComputer security-Management. | |
650 | 0 | _aInformation technology-Management. | |
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aMooney, Tom _tInformation Security a Practical Guide _dEly : IT Governance Ltd,c2015 _z9781849287401 |
797 | 2 | _aProQuest (Firm) | |
856 | 4 | 0 |
_uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=2048580 _zClick to View |
999 |
_c50895 _d50895 |