ABSTRACT

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay

chapter 2|14 pages

E-Mail Security

ByTERENCE FERNANDES

chapter 4|16 pages

‘e Information Security Auditors Have Arrived, Now What?

ByTODD FITZGERALD

chapter 5|10 pages

Continuous Monitoring: Extremely Valuable to Deploy within Reason

ByFOSTER J. HENDERSON, MARK A. PODRACKY

chapter 6|6 pages

Social Networking

chapter 7|4 pages

Insider ‘reat Defense

BySANDY BACIK

chapter 8|18 pages

Risk Management in Public Key Certi›cate Applications

ByALEX GOLOD

chapter 9|12 pages

Server Virtualization: Information Security Considerations

ByTHOMAS A. JOHNSON

chapter 10|22 pages

Security Requirements Analysis

BySEAN M. PRICE

chapter 11|18 pages

CERT Resilience Management Model: An Overview

ByBONNIE A. GOINS PILEWSKI AND CHRISTOPHER PILEWSKI

chapter 12|16 pages

Managing Bluetooth Security

ByE. EUGENE SCHULTZ, MATTHEW W. A. PEMBLE, AND WENDY GOUCHER

chapter 14|18 pages

A “Zero Trust” Model for Security

ByKEN SHAURETTE, THOMAS J. SCHLEPPENBACH

chapter 15|30 pages

Application Whitelisting

ByGEORGES J. JAHCHAN

chapter 16|26 pages

Design of Information Security for Large System Development Projects

ByJAMES C. MURPHY

chapter 18|30 pages

Twenty-Five (or Forty) Years of Malware History

ByROBERT M. SLADE

chapter 19|6 pages

Format Preserving Encryption

ByRALPH SPENCER POORE

chapter 20|6 pages

Elliptic Curve Cryptosystems

ByJEFF STAPLETON

chapter 22|14 pages

Service-Oriented Architecture

ByWALTER B. WILLIAMS

chapter 24|8 pages

Enterprise Zones of Trust

BySANDY BACIK

chapter 26|14 pages

Records Management

BySANDY BACIK

chapter 27|12 pages

Data Backup Strategies: Traditional versus Cloud

ByCARL B. JACKSON

chapter 28|18 pages

Managing Advanced Persistent ‘reats

ByE. EUGENE SCHULTZ AND CUC DU

chapter 29|12 pages

Virtualization Forensics

ByPAUL A. HENRY

chapter 30|20 pages

Terrorism: An Overview

ByFRANK BOLZ, JR., KENNETH J. DUDONIS, AND DAVID P. SCHULZ

chapter 31|14 pages

Countermeasure Goals and Strategies

ByTHOMAS L. NORMAN