• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Assessing and Managing Security Risk in It Systems: A Structured Methodology » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2950560]
• Literatura piękna
 [1849509]

  więcej...
• Turystyka
 [71097]
• Informatyka
 [151150]
• Komiksy
 [35848]
• Encyklopedie
 [23178]
• Dziecięca
 [617388]
• Hobby
 [139064]
• AudioBooki
 [1657]
• Literatura faktu
 [228597]
• Muzyka CD
 [383]
• Słowniki
 [2855]
• Inne
 [445295]
• Kalendarze
 [1464]
• Podręczniki
 [167547]
• Poradniki
 [480102]
• Religia
 [510749]
• Czasopisma
 [516]
• Sport
 [61293]
• Sztuka
 [243352]
• CD, DVD, Video
 [3414]
• Technologie
 [219456]
• Zdrowie
 [101002]
• Książkowe Klimaty
 [124]
• Zabawki
 [2311]
• Puzzle, gry
 [3459]
• Literatura w języku ukraińskim
 [254]
• Art. papiernicze i szkolne
 [8079]
Kategorie szczegółowe BISAC

Assessing and Managing Security Risk in It Systems: A Structured Methodology

ISBN-13: 9780849322327 / Angielski / Twarda / 2004 / 288 str.

Laurie Kelly; John McCumber
Assessing and Managing Security Risk in It Systems: A Structured Methodology McCumber, John 9780849322327 Auerbach Publications - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Assessing and Managing Security Risk in It Systems: A Structured Methodology

ISBN-13: 9780849322327 / Angielski / Twarda / 2004 / 288 str.

Laurie Kelly; John McCumber
cena 354,57
(netto: 337,69 VAT:  5%)

Najniższa cena z 30 dni: 352,39
Termin realizacji zamówienia:
ok. 22 dni roboczych
Dostawa w 2026 r.

Darmowa dostawa!

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments.
Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process.
Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems.
Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Kategorie:
Nauka, Ekonomia i biznes
Kategorie BISAC:
Business & Economics > Information Management
Computers > Management Information Systems
Computers > Security - General
Wydawca:
Auerbach Publications
Język:
Angielski
ISBN-13:
9780849322327
Rok wydania:
2004
Ilość stron:
288
Waga:
0.54 kg
Wymiary:
24.18 x 16.0 x 2.08
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Bibliografia
Wydanie ilustrowane

SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relation to Vulnerabilities Introduction Threat Defined Analyzing Threat Assessing Physical Threats Infrastructure Threat IssuesAssessing Risk Variables: The Risk Assessment Process Introduction Learning to Ask the Right Questions about RiskThe Basic Elements of Risk in IT Systems Information as an Asset Defining Threat for Risk ManagementDefining Vulnerabilities for Risk Management Defining Safeguards for Risk ManagementThe Risk Assessment Process THE McCUMBER CUBE METHODOLOGYThe McCumber CubeIntroduction The Nature of InformationCritical Information Characteristics Confidentiality IntegrityAvailability Security MeasuresTechnology Policy and Practice Education, Training, and Awareness (Human Factors) The Model ReferencesDetermining Information States and MappingInformation Flow Introduction Information States: A Brief Historical Perspective Automated Processing: Why Cryptography Is Not SufficientSimple State Analysis Information States in Heterogeneous Systems Boundary Definition Decomposition of Information StatesDeveloping an Information State MapReference Decomposing the Cube for Security Enforcement Introduction A Word about Security PolicyDefinitions The McCumber Cube Methodology The Transmission StateThe Storage State The Processing StateRecap of the MethodologyInformation State Analysis for Components andSubsystemsIntroduction Shortcomings of Criteria Standards for Security AssessmentsApplying the McCumber Cube Methodology for ProductAssessments Steps for Product and Component Assessment Information Flow Mapping Cube Decomposition Based on Information States Develop Security Architecture Recap of the Methodology for Subsystems, Products, andComponentsReferencesManaging the Security Life CycleIntroduction Safeguard Analysis Introduction Technology SafeguardsProcedural Safeguards Human Factors SafeguardsAssessing and Managing Security Risk in IT SystemsVulnerability-Safeguard Pairing Hierarchical Dependencies of Safeguards Security Policies and Procedural Safeguards Developing Comprehensive Safeguards: The Lessons of the Shogun Identifying and Applying Appropriate SafeguardsComprehensive Safeguard Management: Applying theMcCumber Cube The ROI of Safeguards: Do Security Safeguards Have a Payoff?Practical Applications of McCumber Cube AnalysisIntroduction Applying the Model to Global and National Security IssuesProgramming and Software DevelopmentUsing the McCumber Cube in an Organizational InformationSecurity Program Using the McCumber Cube for Product or Subsystem AssessmentUsing the McCumber Cube for Safeguard Planning and Deployment Tips and Techniques for Building Your Security Program Establishing the Security Program: Defining You Avoiding the Security Cop Label Obtaining Corporate Approval and Support Creating Pearl Harbor FilesDefining Your Security PolicyDefining What versus HowSecurity Policy: Development and ImplementationReference SECTION III APPENDICESVulnerabilities Risk Assessment MetricsDiagrams and TablesOther Resources

John McCumber

Kelly, Laurie Ray Paul has been a resident of Rockford, Illinois... więcej >
McCumber, John John McCumber has taught philosophy in six philoso... więcej >


Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia