Principles and Practice of Information Security / Edition 1

Principles and Practice of Information Security / Edition 1

by Linda Volonino Ph.D, Stephen R. Robinson
     
 

View All Available Formats & Editions

ISBN-10: 0131840274

ISBN-13: 9780131840270

Pub. Date: 10/28/2003

Publisher: Pearson

This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help

Overview

This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices—obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.

Product Details

ISBN-13:
9780131840270
Publisher:
Pearson
Publication date:
10/28/2003
Edition description:
New Edition
Pages:
256
Product dimensions:
7.50(w) x 9.00(h) x 0.60(d)

Table of Contents

I. DIGITAL LIABILITIES AND RISK MANAGEMENT.

1. Security in a Globally Connected Economy.

2. Sources of Digital Liability.

3. Threats, Vulnerabilities, and Risk Exposure.

4. An Affirmative Model of Defense: Digital Liability Management.

5. Models for Estimating Risk and Optimizing the Return on Security Investment.

II. POLICIES, PRACTICES, AND DEFENSIVE TECHNOLOGY.

6. Acceptable Use Policies: Human Defenses.

7. Secure Use Practices: Defensive Best Practices.

8. Technology and Auditing Systems: Hardware and Software Defenses.

III. COMPUTER FORENSICS, ELECTRONIC EVIDENCE, FRAUD, AND COMPUTER CRIME LAWS.

9. Electronic Evidence, Electronic Records Management, and Computer Forensics.

10. Computer Crime, Computer Fraud, and Cyber Terrorism.

Appendix: USA PATRIOT Act.

IV. PRIVACY.

11. Privacy and Data Protection.

Appendix: HIPAA.

Glossary of Technology and Legal Terms.

Abbreviations and Acronyms.

References.

Online References.

Subject Index.

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >