Quantity:
-
Information Assurance: Surviving in the Information Environment examines why organisations need to take information assurance seriously - and covers the business, legal, and technical knowledge needed to do so. It bridges the gap between information security as a technical concept and information security as a business concept, and helps IS managers to manage security effectively so as to facilitate business processes and develop competitive advantage.Key topics include:- The role of the corporate security officer;- Corporate cybercrime;- Electronic commerce and the global marketplace;- Cryptography;- International standards, policies and security acts.Written primarily as a reference for IS managers who need help in dealing with day-to-day security issues, this book will also provide invaluable reading for project managers, IT strategists, business managers and postgraduate students on conversion, Advanced Information Systems and MBA Management courses."A refreshingly clear and wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised."Andrew Jones, Group Manager, Secure Information Systems, DERA, UK"Clear, concise and well-written, with an interesting presentation of global perspectives and drivers that span IT security in its entirety. This book is a must-read for the security practitioner and anyone interested in understanding and protecting public or private sector environments.
Foreword
Preface
Acknowledgements
Section I : An Introduction to Information Assurance
Chapter 1 : What is Information Assurance?
Chapter 2 : The World of Information
Chapter 3 : The Theory of Risks
Chapter 4 : The Information World of Crime
Chapter 5 : IA Trust and Supply Chains
Chapter 6 : Basic IA Concepts and Models
Section II : IA in the World of Corporations
Chapter 7 : The Corporate Security Officer
Chapter 8 : Corporate Security Functions
Chapter 9 : IA in the Interest of National Security
Chapter 10 : The Corporate IA Officer
Chapter 11 : IA Organisational Functions
Section III : Technical Aspects of IA
Chapter 12 : IA and Software
Chapter 13 : Applying Cryptography to IA
Chapter 14 : IA Technology Security
Section IV : The Future and Final Comments
Chapter 15 : The Future, Conclusions and Comments
Appendix A : References and Recommended Readings
Appendix B : The Computer Misuse Act of 1990
Appendix C : The Computer Misuse Act 1990 - Loopholes and Anomalies
Appendix D : US Computer Security Act of 1987
Appendix E : BS7799 Information Security Management
Appendix F : MIS Training Institute “Swiss Army Knife"
Appendix G : Authors’ Biographies
Bibliography
Index