What are the principles of information security 5th edition? This article discusses the meaning of the topic. As a result, you can have more knowledge about this study.
What are the Principles Of Information Security 5th Edition?
Principles of Information Security, 5th Edition is a practical resource that covers all the major topics of information security. Also, the reader will learn the technical and legal aspects of protecting information, as well as how to assess information security risks and mitigate those risks.
The text is designed for a one-semester course in information security, and the study guide at the end of each chapter makes it ideal for self-study as well.
The book focuses on information security as a subject matter, rather than a technology. It places equal emphasis on the technology and business aspects of information security. The coverage of key topics includes:
Part I Principles of Information Security
- 1. Introduction to Information Security
- 2. Classification, Labeling, and Protection
- 3. Confidentiality, Integrity, and Availability
Part II Security in the Software Life Cycle
- 4. Security in Software Acquisition and Development
- 5. Security in Software Operations and Maintenance
- 6. Security in Software Disposal and Retirement
Part III Legal and Organizational Issues
- 7. Legal and Regulatory Issues in Security
- 8. Managers and Security
- 9. Users and Security
- 10. Auditors and Security
- 11. The Human Factor: Social Engineering and Other Foes
Part IV Security Management Framework
- 12. Risk Management: A Strategic Framework for Information Security
- 13. Risk Analysis: Performing a Risk Assessment
- 14. Risk Management Frameworks: An Overview of Key Frameworks and Standards
- 15. Quantitative Risk Analysis: Software Development and Other Applications
Part V Technology Management Framework for Information Security
- 16. Technology Management: A Strategic Framework for Information Security
- 17. Technology Lifecycle Concepts: From Requirements to Retirement; Selection and Implementation
- 18. Technology and the Three Pillars: Combining Security and Availability
- 19. Security and the Internet: The Role of Trust and Assurance
- 20. Business Continuity and Disaster Recovery Planning: Preparing for Catastrophic Events
- 21. Human Resources: Staffing and Managing an Effective Information Security Program
Part VI Case Studies in Information Security
- 22. Case Study 1: Securing a Web Server
- 23. Case Study 2: A Mobile Computing Enterprise
- 24. Case Study 3: Implementing Physical Security Controls
- 25. Case Study 4: A Small Company’s Loss of Confidential Data
- 26. Case Study 5: An Incident Response Plan
- 27. Case Study 6: A Large Enterprise’s Loss of Confidential Data
- 28. Case Study 7: Security in a Virtualized Environment
- 29. Case Study 8: Security in an Outsourced Environment
- 30. Case Study 9: Social Networking on the Corporate Network
- 31. Case Study 10: Mobile Device Security
Benefits
The Principles Of Information Security 5th Edition will give a lot of benefits to you after reading it. The benefits are the following:
The reader will learn how to assess information security risks and mitigate those risks. Also, the text is designed for a one-semester course in information security, and the study guide at the end of each chapter makes it ideal for self-study as well.
Risks
There are not many risks for this book. The only risk is the high cost of the books. However, you can find this publication as a free download from some websites.
In general, this book has been praised by those people who have bought it. They say that they have learned a lot from it. Some students even say that if they do not read this book carefully, they will not pass the exam easily. For those people who want to know more about security, they should read this publication.
Conclusion
The Principles Of Information Security 5th Edition is a practical resource that covers all the major topics of information security. As a result, the reader will learn the technical and legal aspects of protecting information, as well as how to assess information security risks and mitigate those risks.