A Practical Guide to Security Engineering and Information Assurance

Front Cover
CRC Press, Oct 18, 2001 - Business & Economics - 408 pages
Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged s
 

Contents

Chapter 1 Introduction
1
Chapter 2 What Is Information Assurance How Does It Relate to Information Security and Why Are Both Needed?
7
Chapter 3 Historical Approaches to Information Security and Information Assurance
27
Chapter 4 Define the System Boundaries
67
Chapter 5 Perform Vulnerability and Threat Analyses
83
Chapter 6 Implement Threat Control Measures
127
Chapter 7 Verify Effectiveness of Threat Control Measures
207
Chapter 8 Conduct AccidentIncident Investigations
229
Annex A Glossary of Acronyms and Terms
275
Annex B Glossary of Techniques
295
Annex C Additional Resources
353
Annex D Summary of the Components Activities and Tasks of an Effective Information SecurityIA Program
373
Index
379
Back cover
395
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page ii - A Technical Guide to IPSec Virtual Private Networks James S. Tiller ISBN: 0-8493-0876-3 Building an Information Security Awareness Program Mark B. Desman ISBN: 0-8493-01 16-5 Computer Telephony Integration William Yarberry, Jr.

About the author (2001)

Herrmann, Debra S.

Bibliographic information