Handbook of Information Security Management
Now you can get the professional tools you need to take the offensive in the battle against information security threats with Handbook of Information Security Management. Top experts throughout the country share the secrets of their success in all the security-related areas you must know about to make certain your information systems are safe and secure.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Fundamentals of Security Management
H3 Types of Information Security Controls
H4 Computer Security and Human Values
16 other sections not shown
access control activities addition annual loss expectancy application appropriate areas assets audit authorized awareness program backup business continuity plan computer security computer system confidentiality control objectives cost/benefit analysis costs covert channels criteria data base data processing defined determine disaster discretionary access control documents effective employees ensure environment evaluation example Exhibit expert systems files functions hardware identify impact implementation information systems integrity internal controls involved line managers mechanisms ment methodology microcomputer monitoring operating system organization organization's organizational password payoff point perform personnel phase potential present primary storage privileged problem procedures protection quality assurance RACF recovery responsible risk analysis safeguards security policy security professionals security program security requirements security specialist sensitive separation of duties specific staff standards storage system design system security systems development TCSEC technical testing threats tion trusted system unauthorized updated users verify violations vulnerabilities XENIX