Principles and Practice of Information Security / Edition 1by Linda Volonino Ph.D, Stephen R. Robinson
Pub. Date: 10/28/2003
This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help/i>/i>/b>
This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices—obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.
- Publication date:
- Edition description:
- New Edition
- Product dimensions:
- 7.50(w) x 9.00(h) x 0.60(d)
Table of Contents
I. DIGITAL LIABILITIES AND RISK MANAGEMENT.
1. Security in a Globally Connected Economy.
2. Sources of Digital Liability.
3. Threats, Vulnerabilities, and Risk Exposure.
4. An Affirmative Model of Defense: Digital Liability Management.
5. Models for Estimating Risk and Optimizing the Return on Security Investment.
II. POLICIES, PRACTICES, AND DEFENSIVE TECHNOLOGY.
6. Acceptable Use Policies: Human Defenses.
7. Secure Use Practices: Defensive Best Practices.
8. Technology and Auditing Systems: Hardware and Software Defenses.
III. COMPUTER FORENSICS, ELECTRONIC EVIDENCE, FRAUD, AND COMPUTER CRIME LAWS.
9. Electronic Evidence, Electronic Records Management, and Computer Forensics.
10. Computer Crime, Computer Fraud, and Cyber Terrorism.
Appendix: USA PATRIOT Act.
11. Privacy and Data Protection.
Glossary of Technology and Legal Terms.
Abbreviations and Acronyms.
and post it to your social network
Most Helpful Customer Reviews
See all customer reviews >