000 03785nam a22004573i 4500
001 EBC2048580
003 MiAaPQ
005 20240729123627.0
006 m o d |
007 cr cnu||||||||
008 240724s2015 xx o ||||0 eng d
020 _a9781849287425
_q(electronic bk.)
020 _z9781849287401
035 _a(MiAaPQ)EBC2048580
035 _a(Au-PeEL)EBL2048580
035 _a(CaPaEBR)ebr11078153
035 _a(OCoLC)914151232
040 _aMiAaPQ
_beng
_erda
_epn
_cMiAaPQ
_dMiAaPQ
050 4 _aQA76.9.A25 .M666 2015
082 0 _a658.478
100 1 _aMooney, Tom.
245 1 0 _aInformation Security a Practical Guide :
_bBridging the Gap Between IT and Management.
250 _a1st ed.
264 1 _aEly :
_bIT Governance Ltd,
_c2015.
264 4 _c©2015.
300 _a1 online resource (116 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
505 0 _aCover -- Title -- Copyright -- Contents -- Introduction -- Chapter 1: Day One as a Security Professional -- Chapter Overview -- Objectives -- Your First Day -- Confidentiality, Integrity and Availability (CIA) -- Getting to Know the Business -- Key IT Personnel -- What is the Security Culture? -- Identifying the Gaps in Security -- Chapter 2: Business Impact of Breaches -- Chapter Overview -- Objectives -- How to Assess the Impact -- Data Types -- Impacts -- Reputational Damage -- Personal Impact -- Contractual Impact -- Financial Impact -- Legal Impacts -- Chapter 3: Business Risk Appetite -- Chapter Overview -- Objectives -- Risk Appetite -- Risk Treatments -- Chapter 4: Threats -- Chapter Overview -- Objectives -- Types of Threats -- Hackers -- Malware Writers -- Script Kiddies -- Journalists -- Criminals -- Physical Intruder -- Researchers -- Hacktivists -- Disgruntled Employees -- Chapter 5: Quick and Dirty Risk Assessment -- Chapter Overview -- Objectives -- Identifying Risks -- Defining the Risk Level -- Risk Table -- Realigning the Risk Level -- Chapter 6: Getting Buy-in From Your Peers -- Chapter Overview -- Objectives -- Points of Contact with your Peers -- How to Engage with your Peers -- Chapter 7: Documenting the System For Everyone -- Chapter Overview -- Objectives -- Setting the Scene -- Entities -- Service Overview -- Adding Boundaries -- Showing Information Flow -- Adding the Threats -- Chapter 8: Mapping Data in the System -- Chapter Overview -- Objectives -- Mapping Data -- Chapter 9: Penetration Testing -- Chapter Overview -- Objectives -- Types of Penetration Test -- Scoping the test -- Trusting the Testers -- Implementing Fixes -- Chapter 10: Information Security Policy -- Chapter Overview -- Objectives -- The Advantages of Security Policies -- Giving Your Policies Teeth -- Key Security Policies.
505 8 _aWays of Ensuring Your Policy is Read -- ITG Resources.
520 _aProvides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
588 _aDescription based on publisher supplied metadata and other sources.
590 _aElectronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
650 0 _aComputer security-Management.
650 0 _aInformation technology-Management.
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aMooney, Tom
_tInformation Security a Practical Guide
_dEly : IT Governance Ltd,c2015
_z9781849287401
797 2 _aProQuest (Firm)
856 4 0 _uhttps://ebookcentral.proquest.com/lib/orpp/detail.action?docID=2048580
_zClick to View
999 _c50895
_d50895