Information Security A Practical Guide
Information Security A Practical Guide
Publication Date  Available in all formats
ISBN: 9781849287425

EBOOK (EPUB)

EBOOK (PDF)

ISBN: 9781849287425 Price: INR 3144.75
 
Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
Description
Provides an overview of basic information security practices that will enable your security team to better engage with their peers to address the threats facing the organisation as a whole.
Table of contents
  • Cover
  • Title
  • Copyright
  • Contents
  • Chapter 1: Day One as a Security Professional
    • Chapter Overview
    • Objectives
    • Your First Day
    • Confidentiality, Integrity and Availability (CIA)
    • Getting to Know the Business
    • Key IT Personnel
    • What is the Security Culture?
    • Identifying the Gaps in Security
  • Chapter 2: Business Impact of Breaches
    • Chapter Overview
    • Objectives
    • How to Assess the Impact
    • Data Types
    • Impacts
    • Reputational Damage
    • Personal Impact
    • Contractual Impact
    • Financial Impact
    • Legal Impacts
  • Chapter 3: Business Risk Appetite
    • Chapter Overview
    • Objectives
    • Risk Appetite
    • Risk Treatments
  • Chapter 4: Threats
    • Chapter Overview
    • Objectives
    • Types of Threats
    • Hackers
    • Malware Writers
    • Script Kiddies
    • Journalists
    • Criminals
    • Physical Intruder
    • Researchers
    • Hacktivists
    • Disgruntled Employees
  • Chapter 5: Quick and Dirty Risk Assessment
    • Chapter Overview
    • Objectives
    • Identifying Risks
    • Defining the Risk Level
    • Risk Table
    • Realigning the Risk Level
  • Chapter 6: Getting Buy-in From Your Peers
    • Chapter Overview
    • Objectives
    • Points of Contact with your Peers
    • How to Engage with your Peers
  • Chapter 7: Documenting the System For Everyone
    • Chapter Overview
    • Objectives
    • Setting the Scene
    • Entities
    • Service Overview
    • Adding Boundaries
    • Showing Information Flow
    • Adding the Threats
  • Chapter 8: Mapping Data in the System
    • Chapter Overview
    • Objectives
    • Mapping Data
  • Chapter 9: Penetration Testing
    • Chapter Overview
    • Objectives
    • Types of Penetration Test
    • Scoping the test
    • Trusting the Testers
    • Implementing Fixes
  • Chapter 10: Information Security Policy
    • Chapter Overview
    • Objectives
    • The Advantages of Security Policies
    • Giving Your Policies Teeth
    • Key Security Policies
    • Ways of Ensuring Your Policy is Read
  • ITG Resources

Rate this Book

Tell us what you think.