Assessing Information Security: Strategies, Tactics, Logic and Framework

Date: March, 2010

ISBN: 9781849280358

Pages: 412

Language: English

Publisher: IT Governance Publishing

Category: Technical


Posted on 2013-12-23, by ecabuk.

Description

Assessing Information Security: Strategies, Tactics, Logic and Framework

Book Description

What do information security and the art of war have in common?
The answer, this book argues, is a great deal. Although the authors have an expert technical knowledge of information security, they strongly believe that technical and procedural measures cannot offer a solution on their own.

The human factor
Information security is not painting by numbers. You can tick all the right boxes and acquire the latest technology, and you may fail all the same. This is because information security is ultimately a human problem, not a technical one. In the end, the threats to your information security come from human beings, not from machines. Although one problem you will face is simple human error, the major threat to your business information is from the criminal.

Fight Cybercrime
Cybercrime is on the move. It is in a state of constant evolution, capable of adapting both to developments in technology and to whatever security measures its targets have already put in place. It will seek out your weak points in order to exploit them for its own advantage. However, although the people who want to harm your business will try to take you by surprise, they are also bound to have weaknesses of their own. Because the activity of the cybercriminal is both deliberate and hostile, they can be compared to a military adversary. So if you want to defend yourself from cybercrime you can learn from military strategy.

Leadership
Fighting cybercrime is about more than bureaucracy and compliance. Your company’s approach to information security has to be integrated with your overall business goals. The people at the top have to provide leadership, while the people at the bottom need to understand the company’s information security policy and be able to show initiative when faced with an unexpected attack. If you want to take active steps to deter the cybercriminal, then this book is for you. It will help you plan the right strategy for defending your business from cybercrime.

Strategy
Business is an intensely competitive environment. This is why so many executives enjoy the insights that the classics of military strategy, such as Clausewitz and Sun Tzu, provide on how to win. The authors of this book have drawn on Clausewitz in order to interpret the detailed knowledge of information security they have built up through their extensive experience in the field. The result is expert guidance on information security, underpinned by a profound understanding of human conflict.

Benefits to business include:

  • Protect your business information. If you do not carry out proper checks, then something will go badly wrong, and your business will suffer. Use this book to help you understand the best way to implement an information security assessment.
  • Spend money wisely. Information security is not just about having the right equipment. Before you go spending money on fancy gadgets and expensive software, you need to understand what your priorities are, and work out which security measures will be the most effective in protecting your business information.
  • Learn to adapt. The reality is that your business information is not stored in a fixed, fortified place like a castle. Your employees could be blackmailed or bribed, or their company laptops may be hacked into or stolen when they are travelling abroad. So, to protect your company’s business information, you must avoid a fortress mentality and be capable of adapting to an ever-changing environment.
  • Prepare to fight back. Defending your company from malicious hackers, or corrupt and embittered employees, is not just a matter of putting appropriate security structures in place. Criminals go for soft targets, but, if they know your company is ready to fight back, they will be deterred from attacking it. When you know how to identify suspicious behaviour among your staff, you will be in a stronger position to prosecute them for any offence against your company.

As the authors argue, ‘An information security professional is engaged in a form of continuous warfare which is defensive by its very nature. The aim of this “combat” is not to give an inch of the protected “territory” (data, systems, resources) to the adversaries. ‘




Download - Uploaded.To



Sponsored High Speed Downloads
5117 dl's @ 2486 KB/s
Download Now [Full Version]
9538 dl's @ 3560 KB/s
Download Link 1 - Fast Download
5685 dl's @ 2057 KB/s
Download Mirror - Direct Download



Search More...
Assessing Information Security: Strategies, Tactics, Logic and Framework

Search free ebooks in ebookee.com!


Related Archive Books

Archive Books related to "Assessing Information Security: Strategies, Tactics, Logic and Framework":



Links
Download this book

Download links for "Assessing Information Security: Strategies, Tactics, Logic and Framework":

External Download Link1:


Related Books

  1. Ebooks list page : 24267
  2. 2014-01-26Assessing Information Security: Strategies, Tactics, Logic and Framework by Andrew A. Vladimirov - eazydoc.com
  3. 2013-07-16Assessing Information Security: Strategies, Tactics, Logic and Framework
  4. 2012-08-07Assessing Information Security: Strategies, Tactics, Logic and Framework
  5. 2012-04-14Assessing Information Security: Strategies, Tactics, Logic and Framework by Andrew A. Vladimirov
  6. 2011-05-09Assessing Information Security: Strategies, Tactics, Logic and Framework
  7. 2011-02-26Assessing Information Security: Strategies, Tactics, Logic and Framework
  8. 2011-02-26Assessing Information Security: Strategies, Tactics, Logic and Framework
  9. 2011-02-24Assessing Information Security: Strategies, Tactics, Logic and Framework
  10. 2011-02-24Assessing Information Security: Strategies, Tactics, Logic and Framework
  11. 2011-12-30Assessing Information Security: Strategies, Tactics, Logic..
  12. 2011-05-24Assessing Information Security Strategies Tactics Logic
  13. 2011-10-25Information Security - Securing Intellectual Property: Protecting Trade Secrets and Other Information Assets
  14. 2011-10-03Information Security: Principles and Practice
  15. 2019-08-13Designing and Executing Information Security Strategies
  16. 2019-08-13Coursera Designing and Executing Information Security Strategies
  17. 2019-08-09Coursera - Designing and Executing Information Security Strategies
  18. 2018-09-25Coursera - Designing and Executing Information Security Strategies
  19. 2018-07-02Coursera - Designing and Executing Information Security Strategies
  20. 2016-11-19Coursera - Designing and Executing Information Security Strategies

Comments

No comments for "Assessing Information Security: Strategies, Tactics, Logic and Framework".


    Add Your Comments
    1. Download links and password may be in the description section, read description carefully!
    2. Do a search to find mirrors if no download links or dead links.
    Back to Top