Information Assurance Handbook: Effective Computer Security and Risk Management Strategies 1st edition by Corey Schou, Steven Hernandez – Ebook PDF Instant Download/Delivery. 0071821651 978-0071821650
Full download Information Assurance Handbook: Effective Computer Security and Risk Management Strategies 1st edition after payment

Product details:
ISBN 10: 0071821651
ISBN 13: 978-0071821650
Author: Corey Schou, Steven Hernandez
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers anorganizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.
Common threats and vulnerabilities are described and applicable controls based on risk profiles are provided. Practical information assurance application examples are presented for select industries, including healthcare, retail, and industrial control systems. Chapter-endingcritical thinking exercises reinforce the material covered. An extensive list of scholarly works and international government standards is also provided in this detailed guide.
Comprehensive coverage includes:
- Basic information assurance principles and concepts
- Information assurance management system
- Current practices, regulations, and plans
- Impact of organizational structure
- Asset management
- Risk management and mitigation
- Human resource assurance
- Advantages of certification, accreditation, and assurance
- Information assurance in system development and acquisition
- Physical and environmental security controls
- Information assurance awareness, training, and education
- Access control
- Information security monitoring tools and methods
- Information assurance measurements and metrics
- Incident handling and computer forensics
- Business continuity management
- Backup and restoration
- Cloud computing and outsourcing strategies
- Information assurance big data concerns
Information Assurance Handbook: Effective Computer Security and Risk Management Strategies 1st Table of contents:
Preface
- Introduction to Information Assurance
- Purpose and Scope of the Book
- How to Use This Handbook
Chapter 1: Introduction to Information Assurance
- Overview of Information Assurance (IA)
- Key Concepts in Information Security
- Importance of Information Assurance in the Modern Enterprise
- Historical Context and Evolution of IA
Chapter 2: Risk Management and Information Security
- Understanding Risk and Vulnerabilities
- Risk Assessment Process
- Identifying Threats and Threat Actors
- Risk Mitigation Strategies
- Integrating Risk Management into Security Planning
Chapter 3: Security Frameworks and Standards
- Overview of Security Frameworks
- ISO/IEC 27001 and 27002
- NIST Cybersecurity Framework
- COBIT and ITIL for Security Governance
- Security Compliance and Regulatory Requirements
Chapter 4: Developing a Security Program
- Components of a Security Program
- Governance, Risk, and Compliance (GRC)
- Policy Development and Implementation
- Security Controls and Countermeasures
- Creating Incident Response and Business Continuity Plans
Chapter 5: Cryptography and Data Protection
- Basics of Cryptography
- Encryption Methods
People also search for Information Assurance Handbook: Effective Computer Security and Risk Management Strategies 1st :
information assurance publications
information assurance handbook pdf
Information assurance examples
Information assurance compliance
Information security handbook a guide for managers