Introduction to information security a strategic-based approach

"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...

Full description

Saved in:
Bibliographic Details
Main Author: Shimeall, Timothy
Format: Book
Language:English
Published: Amsterdam ; Boston Syngress, an imprint of Elsevier 2014.
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Chapter 1 Motivation and Security Definitions
  • Chapter 2 Strategies and Security
  • Part 1 Deception
  • Chapter 3 Deception Strategies: Networks, Organization, and Structures
  • Chapter 4 Deception Strategies: Defensive Technologies
  • Part 2 Frustration
  • Chapter 5 Frustration Strategies: Technical Controls
  • Chapter 6 Frustration Strategies: Formal Verification
  • Part 3 Resistance
  • Chapter 7 Resistance Strategies: Authentication and Permissions
  • Chapter 8 Resistance Strategies: Symmetric Encryption
  • Chapter 9 Resistance Strategies: Partitioning and Need to Know
  • Chapter 10 Change Management
  • Part 4 Recognition/Recovery
  • Chapter 11 Network Analysis and Forensics
  • Chapter 12 Recognition Strategies: Intrusion Detection and Prevention
  • Chapter 13 Digital Forensics
  • Chapter 14 Recognition Strategies: Integrity Detection
  • Chapter 15 Recovery of Security
  • Chapter 16 Professional Certifications and Overall Conclusions