A Practical Guide To Managing Information Security / Edition 1

A Practical Guide To Managing Information Security / Edition 1

by Steve Purser
ISBN-10:
1580537022
ISBN-13:
9781580537025
Pub. Date:
03/31/2004
Publisher:
Artech House, Incorporated
ISBN-10:
1580537022
ISBN-13:
9781580537025
Pub. Date:
03/31/2004
Publisher:
Artech House, Incorporated
A Practical Guide To Managing Information Security / Edition 1

A Practical Guide To Managing Information Security / Edition 1

by Steve Purser

Hardcover

$102.0
Current price is , Original price is $102.0. You
$102.00 
  • SHIP THIS ITEM
    Qualifies for Free Shipping
  • PICK UP IN STORE
    Check Availability at Nearby Stores
  • SHIP THIS ITEM

    Temporarily Out of Stock Online

    Please check back later for updated availability.


Overview

Using a fictitious case study, Purser (director of ICSD Cross Border Security Design and Administration, Clearstream Services) outlines the design and management of information security programs within large organizations, emphasizing the importance of the decision making process. After introducing the key management techniques and technical tools of information security management, chapters explore the development of the corporate strategy, security policy and standards, a stable information security process, and the security architecture. A final chapter considers the topic of increasing user awareness of security issues through training and education initiatives. Annotation ©2004 Book News, Inc., Portland, OR

Product Details

ISBN-13: 9781580537025
Publisher: Artech House, Incorporated
Publication date: 03/31/2004
Series: Artech House Technology Management Library
Edition description: New Edition
Pages: 284
Product dimensions: 7.00(w) x 10.00(h) x 0.69(d)

Table of Contents

Prefacexiii
Acknowledgmentsxvii
1The need for a proactive approach1
1.1Introduction1
1.2The reality of the modern enterprise3
1.3Evolution of organizational structures4
1.4Evolution of technical infrastructure5
1.5Limitations of policy-driven decision making7
1.6Education and awareness9
1.6.1Management awareness9
1.6.2The technology trap10
1.6.3Awareness of end users10
1.7Operational issues11
1.7.1Complexity11
1.7.2Scalability13
1.8New challenges14
1.8.1Trust14
1.8.2Privacy16
1.9Introducing The (not so) Secure Bank17
1.10Summary19
References20
2Management techniques23
2.1Knowledge and experience23
2.2Information relating to security incidents and vulnerabilities25
2.3Risk analysis and risk management27
2.4Strategy and planning30
2.5Policy and standards32
2.6Processes and procedures34
2.7Methodologies and frameworks36
2.8Awareness and training38
2.9Audits40
2.10Contracts41
2.11Outsourcing42
2.12Summary43
References44
3Technical tools47
3.1Overview47
3.2Classification of security tools48
3.3Host-oriented tools49
3.3.1Security layers49
3.3.2The native operating system security subsystem50
3.3.3Authentication and authorization51
3.3.4System integrity52
3.3.5System access control56
3.3.6System security monitoring58
3.3.7Data confidentiality and integrity60
3.4Network-oriented tools62
3.4.1Network authentication and authorization62
3.4.2Network integrity65
3.4.3Network access control68
3.4.4Network security monitoring71
3.4.5Data confidentiality and integrity72
3.5Supporting infrastructure74
3.5.1PKI74
3.5.2Smart cards and cryptographic modules76
3.5.3Authentication devices79
3.6Summary80
References81
4A proactive approach: Overview85
4.1Introduction85
4.2The consolidation period and strategic-planning cycles86
4.3Deciding on a personal strategy87
4.4The consolidation period89
4.4.1Planning89
4.4.2Establishing contact with stakeholders90
4.4.3Identifying major issues91
4.4.4Classifying issues92
4.4.5Implementing short-term solutions95
4.4.6Identifying quick wins98
4.4.7Implementing initial management-control mechanisms99
4.5The strategic-planning cycle100
4.5.1Overview100
4.5.2Definition of a strategy101
4.5.3Production of a strategic plan102
4.5.4Execution of the strategic plan102
4.5.5Monitoring for further improvement104
4.6The core deliverables105
4.7Summary106
References107
5The information-security strategy109
5.1The need for a strategy109
5.2Planning110
5.3Analysis of the current situation111
5.4Identification of business strategy requirements114
5.5Identification of legal and regulatory requirements117
5.6Identification of requirements due to external trends119
5.7Definition of the target situation122
5.8Definition and prioritization of strategic initiatives123
5.9Distribution of the draft strategy126
5.10Agreement and publication of final strategy127
5.11Summary128
References129
6Policy and standards131
6.1Some introductory remarks on documentation131
6.2Designing the documentation set132
6.3Policy135
6.3.1The purpose of policy statements135
6.3.2Identifying required policy statements136
6.3.3Design and implementation137
6.3.4The Secure Bank--Policy statements139
6.4Establishing a control framework140
6.5Standards143
6.5.1Types of standards143
6.5.2External standards144
6.5.3Internal standards147
6.5.4Agreement and distribution of standards148
6.6Guidelines and working papers150
6.7Summary150
References151
7Process design and implementation155
7.1Requirements for stable processes155
7.2Why processes fail to deliver156
7.2.1Productivity issues156
7.2.2Adaptability issues157
7.2.3Acceptance issues158
7.3Process improvement159
7.3.1Methods for process improvement159
7.3.2Improving productivity161
7.3.3Improving adaptability165
7.3.4Improving acceptance166
7.4The Secure Bank: Improving the authorization and access-control procedure168
7.4.1Planning168
7.4.2The current process168
7.4.3Identifying the target situation171
7.4.4Planning incremental improvements172
7.4.5Implementing improvements174
7.5Continuous improvement176
7.6Summary177
References178
8Building an IT security architecture181
8.1Evolution of enterprise IT infrastructure181
8.2Problems associated with system-focused approaches182
8.3A three-phased approach184
8.4The design phase185
8.4.1Planning185
8.4.2Agreeing on basic design principles186
8.4.3Modeling the IT infrastructure187
8.4.4Risk analysis192
8.4.5Identifying logical components194
8.4.6Obtaining signoff of the concept198
8.5The implementation phase198
8.5.1Planning considerations198
8.5.2Production of a phased implementation plan200
8.5.3Preparing proposals202
8.5.4Selection of commercial packages203
8.5.5Testing and integration205
8.5.6SLAs and support contracts206
8.5.7Technical training208
8.6Administration and maintenance phase208
8.6.1Routine administration and maintenance209
8.6.2Managing vulnerabilities209
8.6.3Managing incidents210
8.6.4Managing risk using risk indicators212
8.7Summary213
References213
9Creating a security-minded culture215
9.1Introduction215
9.2Techniques for introducing cultural change217
9.3Internal marketing and sales219
9.4Support and feedback221
9.5Security-awareness training222
9.5.1The security-awareness program222
9.5.2Planning considerations223
9.5.3Defining the objectives224
9.5.4Identifying the audience224
9.5.5Identifying the message227
9.5.6Developing the material228
9.5.7Defining tracking and follow-up procedures231
9.5.8Delivering the pilot phase231
9.6Security skills training232
9.6.1General remarks232
9.6.2The information-security team233
9.6.3Other staff236
9.7Involvement initiatives237
9.8Summary238
References239
AppendixFast risk analysis241
A.1Introduction241
A.2The method241
A.3A worked example243
A.4Comments243
About the author249
Index251
From the B&N Reads Blog

Customer Reviews