ABSTRACT

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that

part |2 pages

SECTION I: INTRODUCTION

chapter 2|34 pages

Introduction to Management Concepts

chapter 3|38 pages

The Information Security Life Cycle

part |2 pages

SECTION II: SECURITY PLAN

chapter 4|58 pages

Security Plan

chapter 5|48 pages

Security Policy

chapter 6|66 pages

Business Continuity Planning

part |2 pages

SECTION III: SECURITY ANALYSIS

chapter 7|74 pages

Security Risk Management

chapter 9|52 pages

Active Security Assessment

chapter 10|40 pages

System Availability

part |2 pages

SECTION IV: SECURITY DESIGN

part |2 pages

SECTION V: SECURITY IMPLEMENTATION

chapter 13|34 pages

Security Solutions

chapter 14|44 pages

The Common Criteria

part |2 pages

SECTION VI: SECURITY REVIEW

part |2 pages

SECTION VII: CONTINUAL SECURITY

chapter 17|34 pages

The Sarbanes–Oxley Act and IT Compliance

chapter 18|48 pages

Cyberterrorism and Homeland Security