A practical guide to security engineering and information assurance. (©2002)
- Record Type:
- Book
- Title:
- A practical guide to security engineering and information assurance. (©2002)
- Main Title:
- A practical guide to security engineering and information assurance
- Other Titles:
- Security engineering and information assurance
- Further Information:
- Note: Debra S. Herrmann.
- Other Names:
- Herrmann, Debra S
- Contents:
- Introduction; Background; Purpose; Scope; Intended Audience; Organization; What is Information Assurance, How Does it Relate to Information Security, and Why Are Both Needed?; Definition; Application Domains; Technology Domains; Importance; Stakeholders; Summary; Discussion Problems; Historical Approaches to Information Security and Information Assurance; Physical Security; Communications Security (COMSEC); Computer Security (COMPUSEC); Information Security (INFOSEC); Operations Security (OPSEC); System Safety; System Reliability; Summary; Discussion Problems; Define the System Boundaries; Determine What is Being Protected and Why; Identify the System; Characterize System Operation; Ascertain What You Do/Do Not Have Control Over; Summary; Discussion Problems; Perform Vulnerability and Threat Analyses; Definitions; Select/Use IA Analysis Techniques; Identify Vulnerabilities, Their Type, Source, and Severity; Identify Threats, Their Type, Source, and Likelihood; Evaluate Transaction Paths, Critical Threat Zones, and Risk Exposure; Summary; Discussion Problems; Implement Threat Control Measures; Determine How Much Protection is Needed; Operational Procedures, In-Service Considerations, Controllability; Contingency Planning and Disaster Recovery; Perception Management; Select/Implement IA Design Features and Techniques; Summary; Discussion Problems; Verify Effectiveness of Threat Control Measures; Select/Employ IA Verification Techniques; Determine Residual Risk; Monitor OngoingIntroduction; Background; Purpose; Scope; Intended Audience; Organization; What is Information Assurance, How Does it Relate to Information Security, and Why Are Both Needed?; Definition; Application Domains; Technology Domains; Importance; Stakeholders; Summary; Discussion Problems; Historical Approaches to Information Security and Information Assurance; Physical Security; Communications Security (COMSEC); Computer Security (COMPUSEC); Information Security (INFOSEC); Operations Security (OPSEC); System Safety; System Reliability; Summary; Discussion Problems; Define the System Boundaries; Determine What is Being Protected and Why; Identify the System; Characterize System Operation; Ascertain What You Do/Do Not Have Control Over; Summary; Discussion Problems; Perform Vulnerability and Threat Analyses; Definitions; Select/Use IA Analysis Techniques; Identify Vulnerabilities, Their Type, Source, and Severity; Identify Threats, Their Type, Source, and Likelihood; Evaluate Transaction Paths, Critical Threat Zones, and Risk Exposure; Summary; Discussion Problems; Implement Threat Control Measures; Determine How Much Protection is Needed; Operational Procedures, In-Service Considerations, Controllability; Contingency Planning and Disaster Recovery; Perception Management; Select/Implement IA Design Features and Techniques; Summary; Discussion Problems; Verify Effectiveness of Threat Control Measures; Select/Employ IA Verification Techniques; Determine Residual Risk; Monitor Ongoing Risk Exposure, Responses, and Survivability; Summary; Discussion Problems; Conduct Accident/Incident Investigations; Introduction; Analyze Cause, Extent, and Consequences of Failure/Compromise; Initiate Short-term Recovery Mechanisms; Report Accident/Incident; Deploy Long-term Remedial Measures; Evaluate Legal Issues; Summary; Discussion Problems; Annex A - Glossary of Terms; Annex B - Glossary of Techniques; Annex C - Additional Resources; Annex D - Summary of the components, activities, and tasks of an effective information security/IA program; Index … (more)
- Publisher Details:
- Boca Raton : CRC Press
- Publication Date:
- 2002
- Copyright Date:
- 2002
- Extent:
- 1 online resource (xiii, 393 pages), illustrations
- Subjects:
- 005.8
Computer security
Data protection
COMPUTERS -- Internet -- Security
COMPUTERS -- Networking -- Security
COMPUTERS -- Security -- General
Computer security
Data protection
Electronic books - Languages:
- English
- ISBNs:
- 0849311632
9780849311635
9781420031492
0203972929
9780203972922
1281122300
9781281122308 - Related ISBNs:
- 142003149X
- Notes:
- Note: Includes bibliographical references (pages 353-501) and index.
- Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.167657
- Ingest File:
- 01_086.xml