Information security design, implementation, measurement, and compliance

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to...

Full description

Saved in:
Bibliographic Details
Main Author: Layton, Timothy P. (Author)
Format: Book
Language:English
Published: Boca Raton Auerbach Publications 2007
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000#i 4501
001 wils-356061
005 202012494325
008 200224t2007 NYU 000 eng
020 # # |a 0849370876 
020 # # |a 9780849370878 
040 # # |a UiTM  |e rda 
041 0 # |a eng 
090 0 0 |a HF5548.37  |b .L393 2007 
100 1 # |a Layton, Timothy P.  |e author 
245 1 0 |a Information security  |b design, implementation, measurement, and compliance  |c Timothy P. Layton 
264 # 1 |a Boca Raton  |b Auerbach Publications  |c 2007 
300 # # |a 222 pages  |c 25 cm 
336 # # |a text  |2 rdacontent 
337 # # |a unmediated  |2 rdamedia 
338 # # |a volume  |2 rdacarrier 
504 # # |a Includes bibliographical references (p 211-212) and index 
520 # # |a Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context. 
650 # 0 |a Confidential business information 
650 # 0 |a Computer security 
650 # 0 |a Data protection  |x Computer networks  |x Security measures 
650 # 0 |a Risk assessment 
650 # 0 |a Business  |x Data processing  |x Security measures 
650 # 0 |a Business enterprises  |x Computer networks  |x Security measures 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=356061 
964 # # |c BOK  |d 01 
998 # # |a 00264#1a002.8.2||00264#1b002.8.4||00300##a003.4.1||00300##b003.6.1||00300##c003.5.1||00520##a007.2||00520##b007.2||