Information Assurance: Security in the Information Environment 2nd edition by Andrew Blyth, Gerald Kovacich – Ebook PDF Instant Download/Delivery. 1846282667 978-1846282669
Full download Information Assurance: Security in the Information Environment 2nd edition after payment

Product details:
ISBN 10: 1846282667
ISBN 13: 978-1846282669
Author: Andrew Blyth, Gerald Kovacich
When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand. Information assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35-year old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the recent past, the term information warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations – after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the f- lowing three classes of information warfare: Class 1: Personal information warfare Class 2: Corporate information warfare Class 3: Global information warfare Political sensitivities lead to “warfare” being replaced by the “operations”, a much more “politically correct” word. Unfortunately, “operations” also has an offensive connotation and is still the terminology of the military and gove- ments.
Information Assurance: Security in the Information Environment 2nd Table of contents:
Preface
- Overview of the second edition
- New developments in information assurance
- Target audience and how to use the book
1. Introduction to Information Assurance
- Defining Information Assurance and Information Security
- Key Principles: Confidentiality, Integrity, and Availability
- The Information Assurance Landscape: Current Trends and Threats
- The Role of Information Assurance in Society
2. The Information Environment
- The Digital Environment: Networks, Systems, and Data
- The Threat Environment: Cyber Threats, Attacks, and Vulnerabilities
- The Role of Information Assurance in Protecting Digital Assets
- The Security and Privacy Trade-off
3. Risk Management
- Introduction to Risk Management in Information Assurance
- Risk Assessment: Identifying, Evaluating, and Prioritizing Risks
- Risk Mitigation Strategies: Accepting, Avoiding, Reducing, and Transferring Risk
- Frameworks for Risk Management: NIST, ISO 27001, and Other Models
4. Security Policy and Governance
- Developing Security Policies and Procedures
- The Role of Governance in Information Assurance
- Security Management Frameworks and Best Practices
- Regulatory and Legal Aspects of Information Assurance (GDPR, HIPAA, etc.)
5. Cryptography and Data Protection
- Overview of Cryptography in Information Assurance
- Cryptographic Techniques: Symmetric and Asymmetric Encryption
- Key Management and Public Key Infrastructure (PKI)
- Securing Data at Rest and in Transit
6. Authentication and Access Control
- Authentication Methods: Passwords, Biometrics, Multi-Factor Authentication
- Access Control Models: Discretionary, Mandatory, and Role-Based Access Control (RBAC)
- Identity and Access Management (IAM) Systems
- Privileged Access Management (PAM) and Zero Trust Architecture
7. Network and System Security
- Securing Networks and Network Devices
- Firewalls, Intrusion Detection Systems (IDS), and Intrusion Prevention Systems (IPS)
- Securing Wireless Networks and Remote Access Technologies
- Securing Endpoints: Devices, Servers, and Workstations
8. Incident Response and Management
- Incident Response Life Cycle: Preparation, Detection, Containment, and Recovery
- Forensics and Incident Analysis
- Legal and Ethical Considerations in Incident Handling
- Coordinating Incident Response and Communication
9. Security Operations and Monitoring
- Security Operations Centers (SOCs) and Their Role
- Continuous Monitoring: Tools and Techniques
- Security Information and Event Management (SIEM) Systems
- Threat Intelligence and Threat Hunting
10. Security Assurance and Testing
- Vulnerability Assessments and Penetration Testing
- Secure Software Development Life Cycle (SDLC)
- Security Audits and Compliance Assessments
- Continuous Improvement in Security Programs
11. Business Continuity and Disaster Recovery
- Business Continuity Planning (BCP)
- Disaster Recovery Planning (DRP)
- Crisis Management and Communication Strategies
- Testing and Validating BCP and DRP Plans
12. Emerging Challenges in Information Assurance
- Security in Cloud Computing and Virtualization
- Securing the Internet of Things (IoT) and Smart Devices
- Artificial Intelligence (AI) and Machine Learning in Cybersecurity
- Privacy Concerns and the Role of Data Protection Laws
13. Future Directions and Trends in Information Assurance
- The Evolution of Cyber Threats and Attacks
- Next-Generation Information Assurance Technologies
- Trends in Automation, AI, and Security
- Preparing for Future Challenges in Information Assurance
14. Conclusion
- The Role of Information Assurance in the Digital Age
- Building a Security Culture in Organizations
- Resources for Further Learning and Development in Information Assurance
Appendices
- Glossary of Terms
- List of Tools, Resources, and References
- Further Reading and Study Materials
- Index
People also search for Information Assurance: Security in the Information Environment 2nd :
cybersecurity and information assurance
cybersecurity and information assurance salary
relevé d information assurance
army information assurance training
dod information assurance awareness training