Introduction to information security a strategic-based approach
"The purpose of this book is primarily to develop a strategic method of thinking about information security. Chapters 1 and 2 motivate the strategic approach and define security-related terms. Chapters 3-15 are organized around a certain type of contribution to a strategic area. The four strate...
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Amsterdam ; Boston
Syngress, an imprint of Elsevier
2014.
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Chapter 1 Motivation and Security Definitions
- Chapter 2 Strategies and Security
- Part 1 Deception
- Chapter 3 Deception Strategies: Networks, Organization, and Structures
- Chapter 4 Deception Strategies: Defensive Technologies
- Part 2 Frustration
- Chapter 5 Frustration Strategies: Technical Controls
- Chapter 6 Frustration Strategies: Formal Verification
- Part 3 Resistance
- Chapter 7 Resistance Strategies: Authentication and Permissions
- Chapter 8 Resistance Strategies: Symmetric Encryption
- Chapter 9 Resistance Strategies: Partitioning and Need to Know
- Chapter 10 Change Management
- Part 4 Recognition/Recovery
- Chapter 11 Network Analysis and Forensics
- Chapter 12 Recognition Strategies: Intrusion Detection and Prevention
- Chapter 13 Digital Forensics
- Chapter 14 Recognition Strategies: Integrity Detection
- Chapter 15 Recovery of Security
- Chapter 16 Professional Certifications and Overall Conclusions


