Speed | Asset Protection through Security Awareness | E-Book | sack.de
E-Book

E-Book, Englisch, 337 Seiten

Speed Asset Protection through Security Awareness


Erscheinungsjahr 2013
ISBN: 978-1-4398-0983-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 337 Seiten

ISBN: 978-1-4398-0983-9
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Supplying a high-level overview of how to protect your company’s physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks. The author reviews key topics surrounding computer security—including privacy, access controls, and risk management—to help fill the gaps that might exist between management and the technicians securing your network systems.

In an accessible style that requires no previous networking or programming experience, the book delivers a practical approach to asset protection. It specifies the roles of managers and employees in creating a company-wide culture of security awareness and provides step-by-step instruction on how to build an effective security awareness team. Each chapter examines a separate security issue and provides a brief overview of how to address that issue. It includes tools and checklists to help you address:

- Visual, digital, and auditory data security

- Credit card compliance (PCI), password management, and social engineering

- User authentication methods

- Computer and network forensics

- Physical security and continuity planning

- Privacy concerns and privacy-related regulation

This concise security management primer facilitates the up-to-date understanding required to protect your digital and physical assets, including customer data, networking equipment, and employee information. Providing you with powerful tools of diplomacy, this text will help you win the support of your employees and empower them to be effective gatekeepers of your company’s most valued assets and trade secrets.

Speed Asset Protection through Security Awareness jetzt bestellen!

Zielgruppe


IT managers and staff; IT trainers.


Autoren/Hrsg.


Weitere Infos & Material


Introduction: What Is Information Security?

Creating a Culture of Security Awareness
Protecting Corporate Assets
Protective Measures
A Culture of Security Awareness
Remaining Dynamic

Overview of Security Awareness Categories
Overview
Industry Standards
Privacy Concerns
Password Management
Credit Card Compliance (PCI)
General File Management
Examples of Security Regulations and Laws

Who Is an IS Professional?
Introduction
Empowering Security Professionals
Top-Down Approach

Diplomacy
The People Portion of Information Security
The IS Specialist
Diplomacy—The IS Professional’s Best Friend
End Users Are Great Network Monitors
The End User’s Diplomatic Responsibility

Privacy Concerns
What Is Privacy?
Why Does Privacy Matter?
Types of Private Data
Keeping Files Private
Privacy-Related Regulations and Laws
Privacy Policies

Interdepartmental Security
Interdepartmental Security

Risk Management
Risk Management and Asset Protection
Risk Management

Social Engineering
What Is Social Engineering?
Psychology of Social Engineering
Social Engineering Information Gathering Methods

Incident Detection and Response
What Is an Incident?
Incident Detection
Incident Response
Computer Security Incident Response Teams
Preparedness Is Key

Physical Security
Human-Caused Incidents
Physical Security Measures
Weather/Natural Disasters

PCI Compliance
Category 1. Protect and Maintain a Secure Network
Category 2: Protect Cardholder Data
Category 3: Maintain a Vulnerability Management Program
Category 4: Implement Strong Access Control Measures
Category 5: Regularly Monitor and Test Networks
Category 6: Maintain an Information Security Policy
A Good Place to Start

Business Continuity Planning
Evaluation of Critical Systems and Resources
Prioritization of Critical Systems and Resources
Identify Threats Posed to Critical Systems and Resources
Assign Business Continuity Responsibilities
Develop the Continuity Planning Policy Statement
Implement Business Continuity Plan
Maintain the Plan
Train According to Business Continuity Plan Objectives

User Authentication Methods
User Authentication
Cryptosystems
Public Key Infrastructure
Web of Trust

Computer and Network Forensics
Acquire
Authenticate
Analyze

Malware
Introduction
Viruses
Worms
Keyloggers
Rootkits
Spyware
Adware
Trojan Horses
Types of Antivirus Programs
Detecting and Removing Viruses
Recommended Antivirus Programs
Software Updates

Crafting a Security Policy
Planning Versus Reactionary Response (Or—Why It’s Important to Have a Security Plan)
Don’t Wait to Plan
Standards, Policies, Procedures, and Controls
Accessibility, Supportability, and Clarity
Assessing the Organization’s Network Infrastructure
Security Policy Structure Outline
Distribution of the Policy

Performing Security Analyses and Audits
The Necessity
Audit Committees
Preaudit Considerations
Defining Security Rules
Performing a Risk Assessment
Build the Security Architecture
How Frequently Should Audits Be Performed?

Access Control
Accountability
Identification and Authentication
Different Access Control Methodologies

Security Checklists
Checklist for Creating a Security Policy
Network Inventory Checklist
Physical Security Checklist
Index


Tyler Speed is the Executive Vice President of Electronics International in Bend, Oregon and has a Masters Degree in Information Assurance from the NSA-certified Norwich University in Northfield, Vermont. As a corporate leader in aviation, not only does Tyler deal with governmental regulations and compliance issues from the FAA, but he must also temper customer service and sales needs with a solid foundation in security and training in order to protect sales records, customer information, trade secrets and proprietary information. Tyler has been tinkering with computers and networks since the days of Bulletin Board Services, and understands the need for a common sense approach to corporate security awareness and training. At the time of this publication, Tyler is studying to obtain his Certified Information Systems Seucrity Professional (CISSP) certification.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.