McCumber | Assessing and Managing Security Risk in IT Systems | E-Book | www.sack.de
E-Book

E-Book, Englisch, 288 Seiten

McCumber Assessing and Managing Security Risk in IT Systems

A Structured Methodology
Erscheinungsjahr 2004
ISBN: 978-1-135-48896-3
Verlag: CRC Press
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

A Structured Methodology

E-Book, Englisch, 288 Seiten

ISBN: 978-1-135-48896-3
Verlag: CRC Press
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments.

Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process.

Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems.

Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

McCumber Assessing and Managing Security Risk in IT Systems jetzt bestellen!

Zielgruppe


Information security professionals, Security consultants, IT auditors, students, ,information security management, IT management with security responsibility, Senior security management (e.g. Chief Security Officer)


Autoren/Hrsg.


Weitere Infos & Material


SECURITY CONCEPTS

Using Models
Introduction: Understanding, Selecting, and Applying Models

Understanding Assets
Layered Security

Using Models in Security

Security Models for Information Systems

Shortcomings of Models in Security
Security in Context

Reference

Defining Information Security
Confidentiality, Integrity, and Availability

Information Attributes
Intrinsic versus Imputed Value

Information as an Asset

The Elements of Security

Security Is Security Only in Context

Information as an Asset

Introduction

Determining Value

Managing Information Resources

References

Understanding Threat and Its Relation to Vulnerabilities

Introduction

Threat Defined

Analyzing Threat

Assessing Physical Threats

Infrastructure Threat Issues

Assessing Risk Variables: The Risk Assessment Process

Introduction

Learning to Ask the Right Questions about Risk
The Basic Elements of Risk in IT Systems

Information as an Asset

Defining Threat for Risk Management
Defining Vulnerabilities for Risk Management

Defining Safeguards for Risk Management
The Risk Assessment Process

THE McCUMBER CUBE METHODOLOGY

The McCumber Cube
Introduction

The Nature of Information
Critical Information Characteristics

Confidentiality

Integrity
Availability

Security Measures
Technology

Policy and Practice

Education, Training, and Awareness (Human Factors)

The Model

References

Determining Information States and Mapping
Information Flow

Introduction

Information States: A Brief Historical Perspective

Automated Processing: Why Cryptography Is Not Sufficient
Simple State Analysis

Information States in Heterogeneous Systems

Boundary Definition

Decomposition of Information States
Developing an Information State Map
Reference

Decomposing the Cube for Security Enforcement

Introduction

A Word about Security Policy
Definitions

The McCumber Cube Methodology

The Transmission State
The Storage State

The Processing State
Recap of the Methodology

Information State Analysis for Components and
Subsystems
Introduction

Shortcomings of Criteria Standards for Security Assessments
Applying the McCumber Cube Methodology for Product
Assessments

Steps for Product and Component Assessment

Information Flow Mapping

Cube Decomposition Based on Information States

Develop Security Architecture

Recap of the Methodology for Subsystems, Products, and
Components
References

Managing the Security Life Cycle
Introduction

Safeguard Analysis

Introduction

Technology Safeguards
Procedural Safeguards

Human Factors Safeguards
Assessing and Managing Security Risk in IT Systems
Vulnerability-Safeguard Pairing

Hierarchical Dependencies of Safeguards

Security Policies and Procedural Safeguards

Developing Comprehensive Safeguards: The Lessons of the Shogun

Identifying and Applying Appropriate Safeguards
Comprehensive Safeguard Management: Applying the
McCumber Cube

The ROI of Safeguards: Do Security Safeguards Have a Payoff?

Practical Applications of McCumber Cube Analysis
Introduction

Applying the Model to Global and National Security Issues
Programming and Software Development
Using the McCumber Cube in an Organizational Information
Security Program

Using the McCumber Cube for Product or Subsystem Assessment
Using the McCumber Cube for Safeguard Planning and Deployment

Tips and Techniques for Building Your Security Program

Establishing the Security Program: Defining You

Avoiding the Security Cop Label

Obtaining Corporate Approval and Support

Creating Pearl Harbor Files
Defining Your Security Policy
Defining What versus How
Security Policy: Development and Implementation
Reference

SECTION III APPENDICES

Vulnerabilities

Risk Assessment Metrics
Diagrams and Tables
Other Resources



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.