Information Security: Design, Implementation, Measurement, and Compliance, 1st Edition (e-Book) book cover

Information Security

Design, Implementation, Measurement, and Compliance, 1st Edition

By Timothy P. Layton

Auerbach Publications

264 pages

Purchasing Options:$ = USD
Hardback: 9780849370878
pub: 2006-07-20
eBook (VitalSource) : 9780429119149
pub: 2016-04-19
from $28.98

FREE Standard Shipping!


Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs.


Table of Contents

EVALUATING AND MEASURING AN INFORMATION SECURITY PROGRAM. Information Security Risk Assessment Model (ISRAM�). Global Information Security Assessment Methodology (GISAM�). Developing an Information Security Evaluation (ISE�) Process. A Security Baseline. Background of the ISO/IEC 17799 Standard. ISO/IEC 17799:2005 Gap Analysis. ANALYSIS OF ISO/IEC 17799:2005 (27002) CONTROLS. Security Policy. Organization of Information Security. Asset Management. Human Resources Security. Physical and Environmental Security. Communications and Operations Management. Access Control. Information Systems Acquisition, Development, and Maintenance. Information Security Incident Management. Business Continuity Management. Compliance. Appendix A: ISO Standards Cited in ISO/IEC 17799:2005. Appendix B: General References. Index.

Subject Categories

BISAC Subject Codes/Headings:
COMPUTERS / Information Technology
COMPUTERS / Security / General