Information Assurance: Surviving in the Information Environment
by Andrew BlythInformation Assurance: Surviving in the Information Environment examines why organisations need to take information assurance seriously - and covers the business, legal, and technical knowledge needed to do so. It bridges the gap between information security as a technical concept and information security as a business concept, and helps IS managers to manage security… See more details below
Overview
Information Assurance: Surviving in the Information Environment examines why organisations need to take information assurance seriously - and covers the business, legal, and technical knowledge needed to do so. It bridges the gap between information security as a technical concept and information security as a business concept, and helps IS managers to manage security effectively so as to facilitate business processes and develop competitive advantage.Key topics include:- The role of the corporate security officer;- Corporate cybercrime;- Electronic commerce and the global marketplace;- Cryptography;- International standards, policies and security acts.Written primarily as a reference for IS managers who need help in dealing with day-to-day security issues, this book will also provide invaluable reading for project managers, IT strategists, business managers and postgraduate students on conversion, Advanced Information Systems and MBA Management courses."A refreshingly clear and wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised."Andrew Jones, Group Manager, Secure Information Systems, DERA, UK"Clear, concise and well-written, with an interesting presentation of global perspectives and drivers that span IT security in its entirety. This book is a must-read for the security practitioner and anyone interested in understanding and protecting public or private sector environments..."Donald L. Evans, United Space Alliance, Houston, Texas, US"If you could choose only one primer, this is the THE book." Perry Luzwick, Director, Information Assurance Architectures,Logicon, US
Product Details
- ISBN-13:
- 9781852333263
- Publisher:
- Springer-Verlag New York, LLC
- Publication date:
- 10/06/2001
- Series:
- Computer Communications and Networks Series
- Edition description:
- Older Edition
- Pages:
- 360
- Product dimensions:
- 6.14(w) x 9.21(h) x 0.75(d)
Table of Contents
Foreword | ix | |
Preface | xi | |
Acknowledgements | xv | |
Section 1 | An Introduction to Information Assurance | 1 |
Chapter 1 | What is Information Assurance? | 3 |
Chapter 2 | The World of Information | 17 |
Chapter 3 | The Theory of Risks | 31 |
Chapter 4 | The Information World of Crime | 51 |
Chapter 5 | IA Trust and Supply Chains | 73 |
Chapter 6 | Basic IA Concepts and Models | 87 |
Section 2 | IA in the World of Corporations | 107 |
Chapter 7 | The Corporate Security Officer | 109 |
Chapter 8 | Corporate Security Functions | 117 |
Chapter 9 | IA in the Interest of National Security | 129 |
Chapter 10 | The Corporate IA Officer | 141 |
Chapter 11 | IA Organisational Functions | 151 |
Section 3 | Technical Aspects of IA | 173 |
Chapter 12 | IA and Software | 175 |
Chapter 13 | Applying Cryptography to IA | 197 |
Chapter 14 | IA Technology Security | 207 |
Section 4 | The Future and Final Comments | 219 |
Chapter 15 | The Future, Conclusions and Comments | 221 |
Appendix A | References and Recommended Readings | 229 |
Appendix B | The Computer Misuse Act of 1990 | 235 |
Appendix C | The Computer Misuse Act 1990 - Loopholes and Anomalies | 241 |
Appendix D | US Computer Security Act of 1987 | 271 |
Appendix E | BS7799 Information Security Management | 279 |
Appendix F | MIS Training Institute "Swiss Army Knife" | 289 |
Appendix G | Authors' Biographies | 331 |
Index | 333 |
Customer Reviews
Average Review: