eBooks-it.org Logo
eBooks-IT.org Inner Image

Assessing Information Security

Strategies, Tactics, Logic and Framework

Assessing Information Security Image

Book Details:

Publisher:IT Governance Publishing
Series: MIX
Author:Andrew A. Vladimirov
Edition:1
ISBN-10:1849280355
ISBN-13:9781849280358
Pages:412
Published:Mar 11 2010
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:4.54 MB

Book Description:

What do information security and the art of war have in common? The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own. Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal. Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy. Fighting cybercrime is about more than bureaucracy and compliance. Your company's approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company's information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime.

Download Link:

Related Books:

Optimizing and Assessing Information Technology

Improving Business Project Execution
Optimizing and Assessing Information Technology Image
A valuable guide to making better IT decisions within businessOptimizing and Assessing Information Technology is designed to be both easy-to-use and immediately useful. Engaging and accessible, this book has been created to help you focus on improving business project execution through effective IT optimization and assessment. While it skillfully outlines a framework for optimizing and assessing IT, it does not get into specific technologies per se, given the rapid and increasing pace of technical change across the world today. Optimizing and Assessing Information Technology involves a step-by-step process whereby various aspects of IT are evaluated. In addition to the book itself, a companion website offers templates, checklists, and related materia...

Information Security Auditor

Careers in Information Security
Information Security Auditor Image
The role of an information security (or assurance) auditor is vital for identifying security gaps in an organisation's information systems. This practical book gives an excellent introduction to the role, covering areas such as purpose, required skills, responsibilities, interface and career progression as well as tools, standards and frameworks related to the role. It gives practical guidance to those new to the role or interested in developing a better understanding of what it entails....

Security Risk Management

Building an Information Security Risk Management Program from the Ground Up
Security Risk Management Image
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called "best practices" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods...



2007 - 2021 © eBooks-IT.org