Management of Information Security.
Main Author: | |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Mason, OH :
Cengage,
2018.
|
Edition: | 6th ed. |
Subjects: | |
Online Access: | View fulltext via EzAccess |
Table of Contents:
- Cover
- Title
- Statement
- Copyright
- Brief Contents
- Table of Contents
- Preface
- Chapter 1: Introduction to the Management of Information Security
- Introduction to Security
- CNSS Security Model
- The Value of Information and the C.I.A. Triad
- Key Concepts of Information Security: Threats and Attacks
- The 12 Categories of Threats
- Management and Leadership
- Behavioral Types of Leaders
- Management Characteristics
- Governance
- Solving Problems
- Principles of Information Security Management
- Planning
- Policy
- Programs
- Protection
- People
- Projects
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 2: Compliance: Law and Ethics
- Introduction to Law and Ethics
- Ethics in InfoSec
- Ethics and Education
- Deterring Unethical and Illegal Behavior
- Professional Organizations and Their Codes of Conduct
- Association for Computing Machinery (ACM)
- International Information Systems Security Certification Consortium, Inc. (ISC)²
- SANS
- Information Systems Audit and Control Association (ISACA)
- Information Systems Security Association (ISSA)
- Information Security and Law
- Types of Law
- Relevant U.S. Laws
- International Laws and Legal Bodies
- State and Local Regulations
- Standards Versus Law
- Policy Versus Law
- Organizational Liability and the Management of Digital Forensics
- Key Law Enforcement Agencies
- Managing Digital Forensics
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 3: Governance and Strategic Planning for Security
- The Role of Planning
- Precursors to Planning
- Strategic Planning
- Creating a Strategic Plan
- Planning Levels.
- Planning and the CISO
- Information Security Governance
- The ITGI Approach to Information Security Governance
- NCSP Industry Framework for Information Security Governance
- CERT Governing for Enterprise Security Implementation
- ISO/IEC 27014:2013 Governance of Information Security
- Security Convergence
- Planning for Information Security Implementation
- Implementing the Security Program using the SecSDLC
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 4: Information Security Policy
- Why Policy?
- Policy, Standards, and Practices
- Enterprise Information Security Policy
- Integrating an Organization's Mission and Objectives into the EISP
- EISP Elements
- Example EISP Elements
- Issue-Specific Security Policy
- Elements of the ISSP
- Implementing the ISSP
- System-Specific Security Policy
- Managerial Guidance SysSPs
- Technical Specification SysSPs
- Guidelines for Effective Policy Development and Implementation
- Developing Information Security Policy
- Policy Distribution
- Policy Reading
- Policy Comprehension
- Policy Compliance
- Policy Enforcement
- Policy Development and Implementation Using the SDLC
- Software Support for Policy Administration
- Other Approaches to Information Security Policy Development
- SP 800-18, Rev. 1: Guide for Developing Security Plans for Federal Information Systems
- A Final Note on Policy
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 5: Developing the Security Program
- Organizing for Security
- Security in Large Organizations
- Security in Medium-Sized Organizations
- Security in Small Organizations.
- Placing Information Security Within an Organization
- Components of the Security Program
- Staffing the Security Function
- Information Security Professional Credentials
- Entering the Information Security Profession
- Implementing Security Education, Training, and Awareness (SETA) Programs
- Security Education
- Security Training
- Security Awareness
- Project Management in Information Security
- Projects Versus Processes
- Organizational Support for Project Management
- PMBOK Knowledge Areas
- Project Management Tools
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 6: Risk Management: Assessing Risk
- Introduction to the Management of Risk in Information Security
- Knowing Yourself and Knowing the Enemy
- The Information Security Risk Management Framework
- Roles of Communities of Interest in Managing Risk
- Executive Governance and Support
- Framework Design
- Framework Implementation
- Framework Monitoring and Review
- Continuous Improvement
- The Risk Management Process
- RM Process Preparation-Establishing the Context
- Risk Assessment: Risk Identification
- Risk Assessment: Risk Analysis
- Risk Evaluation
- Risk Treatment/Risk Control
- Process Communications, Monitoring, and Review
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 7: Risk Management: Treating Risk
- Introduction to Risk Treatment
- Risk Treatment Strategies
- Managing Risk
- Feasibility and Cost-benefit Analysis
- Other Methods of Establishing Feasibility
- Alternatives to Feasibility Analysis
- Recommended Alternative Risk Treatment Practices
- Alternative Risk Management Methodologies
- The OCTAVE Methods.
- Microsoft Risk Management Approach
- FAIR
- ISO Standards for InfoSec Risk Management
- NIST Risk Management Framework (RMF)
- Other Methods
- Selecting the Best Risk Management Model
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 8: Security Management Models
- Introduction to Blueprints, Frameworks, and Security Models
- Security Management Models
- The ISO 27000 Series
- NIST Security Publications
- Control Objectives for Information and Related Technology
- Committee of Sponsoring Organizations
- Information Technology Infrastructure Library
- Information Security Governance Framework
- Security Architecture Models
- TCSEC and the Trusted Computing Base
- Information Technology System Evaluation Criteria
- The Common Criteria
- Access Control Models
- Categories of Access Controls
- Other Forms of Access Control
- Academic Access Control Models
- Bell-LaPadula Confidentiality Model
- Biba Integrity Model
- Clark-Wilson Integrity Model
- Graham-Denning Access Control Model
- Harrison-Ruzzo-Ullman Model
- Brewer-Nash Model (Chinese Wall)
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 9: Security Management Practices
- Introduction to Security Practices
- Security Employment Practices
- Hiring
- Contracts and Employment
- Security Expectations in the Performance Evaluation
- Termination Issues
- Personnel Security Practices
- Security of Personnel and Personal Data
- Security Considerations for Temporary Employees, Consultants, and Other Workers
- Information Security Performance Measurement
- InfoSec Performance Management
- Building the Performance Measurement Program.
- Specifying InfoSec Measurements
- Collecting InfoSec Measurements
- Implementing InfoSec Performance Measurement
- Reporting InfoSec Performance Measurements
- Benchmarking
- Standards of Due Care/Due Diligence
- Recommended Security Practices
- Selecting Recommended Practices
- Limitations to Benchmarking and Recommended Practices
- Baselining
- Support for Benchmarks and Baselines
- ISO Certification
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 10: Planning for Contingencies
- Introduction to Contingency Planning
- Fundamentals of Contingency Planning
- Components of Contingency Planning
- Business Impact Analysis
- Contingency Planning Policies
- Incident Response
- Getting Started
- Incident Response Policy
- Incident Response Planning
- Detecting Incidents
- Reacting to Incidents
- Recovering from Incidents
- Disaster Recovery
- The Disaster Recovery Process
- Disaster Recovery Policy
- Disaster Classification
- Planning to Recover
- Responding to the Disaster
- Simple Disaster Recovery Plan
- Business Continuity
- Business Continuity Policy
- Continuity Strategies
- Timing and Sequence of CP Elements
- Crisis Management
- Business Resumption
- Testing Contingency Plans
- Final Thoughts on CP
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions
- Ethical Decision Making
- Endnotes
- Chapter 11: Security Maintenance
- Introduction to Security Maintenance
- Security Management Maintenance Models
- NIST SP 800-100, Information Security Handbook: A Guide for Managers
- The Security Maintenance Model
- Additional Reading
- Chapter Summary
- Review Questions
- Exercises
- Closing Case
- Discussion Questions.
- Ethical Decision Making.