Information security governance simplified : from the boardroom to the keyboard / Todd Fitzgerald
データ種別 | 電子ブック |
---|---|
出版者 | Boca Raton : CRC Press |
出版年 | ©2012 |
本文言語 | 英語 |
大きさ | 1 online resource (xxviii, 381 pages) : illustrations |
書誌詳細を非表示
資料種別 | 機械可読データファイル |
---|---|
内容注記 | Ch. 1. Getting information security right : top to bottom ch. 2. Developing information security strategy ch. 3. Defining the security management organization ch. 4. Interacting with the C-suite ch. 5. Managing risk to an acceptable level ch. 6. Creating effective information security policies ch. 7. Security compliance using control frameworks ch. 8. Managerial controls : practical security considerations ch. 9. Technical controls : practical security considerations ch. 10. Operational controls : practical security considerations ch. 11. The auditors have arrived, now what? ch. 12. Effective security communications ch. 13. The law and information security ch. 14. Learning from information security incidents ch. 15. 17 ways to dismantle information security governance efforts |
一般注記 | "Security practitioners must be able to build cost-effective security programs while also complying with government regulations. Information Security Governance Simplified: From the Boardroom to the Keyboard lays out these regulations in simple terms and explains how to use control frameworks to build an air-tight information security (IS) program and governance structure. Defining the leadership skills required by IS officers, the book examines the pros and cons of different reporting structures and highlights the various control frameworks available. It details the functions of the security department and considers the control areas, including physical, network, application, business continuity/disaster recover, and identity management. Todd Fitzgerald explains how to establish a solid foundation for building your security program and shares time-tested insights about what works and what doesn't when building an IS program. Highlighting security considerations for managerial, technical, and operational controls, it provides helpful tips for selling your program to management. It also includes tools to help you create a workable IS charter and your own IS policies. Based on proven experience rather than theory, the book gives you the tools and real-world insight needed to secure your information while ensuring compliance with government regulations."-- Provided by publisher Open Access Includes bibliographical references and index Print version record |
著者標目 | *Fitzgerald, Todd. |
件 名 | LCSH:Information networks -- Security measures
全ての件名で検索
LCSH:Information resources management LCSH:Business intelligence LCSH:Information technology -- Security measures 全ての件名で検索 BISACSH:BUSINESS & ECONOMICS -- Commerce 全ての件名で検索 BISACSH:COMPUTERS -- Information Technology 全ての件名で検索 BISACSH:COMPUTERS -- Security -- General 全ての件名で検索 BISACSH:COMPUTERS -- Internet -- Security 全ての件名で検索 BISACSH:COMPUTERS -- Networking -- Security 全ての件名で検索 FREE:Business intelligence FREE:Information networks -- Security measures 全ての件名で検索 FREE:Information resources management FREE:Information technology -- Security measures 全ての件名で検索 BSH:Electronic books LCSH:Electronic books |
分 類 | DC23:005.8 |
書誌ID | ED00001225 |
ISBN | 9781439811658 |
類似資料
この資料の利用統計
このページへのアクセス回数:2回
※2020年9月23日以降