Practices for Securing Critical Information Assets
Author :
Publisher :
Page : 104 pages
File Size : 15,74 MB
Release : 2000
Category : Computer networks
ISBN :
Author :
Publisher :
Page : 104 pages
File Size : 15,74 MB
Release : 2000
Category : Computer networks
ISBN :
Author :
Publisher :
Page : 46 pages
File Size : 38,90 MB
Release : 1996
Category : Computer security
ISBN :
Author : Barbara Guttman
Publisher : DIANE Publishing
Page : 289 pages
File Size : 10,89 MB
Release : 1995
Category : Computer networks
ISBN : 0788128302
Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.
Author :
Publisher :
Page : 904 pages
File Size : 13,19 MB
Release : 1994
Category : Chemistry
ISBN :
Reports NIST research and development in the physical and engineering sciences in which the Institute is active. These include physics, chemistry, engineering, mathematics, and computer sciences. Emphasis on measurement methodology and the basic technology underlying standardization.
Author : Michael S. Baum
Publisher :
Page : 562 pages
File Size : 20,90 MB
Release : 1994
Category : Language Arts & Disciplines
ISBN :
Author : National Institute of Standards and Technology (U.S.)
Publisher :
Page : 1162 pages
File Size : 12,26 MB
Release : 1994
Category :
ISBN :
Author : John S. Potts
Publisher : Nova Publishers
Page : 158 pages
File Size : 30,16 MB
Release : 2002
Category : Computers
ISBN : 9781590335215
We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.
Author : Thomas R. Peltier
Publisher : CRC Press
Page : 368 pages
File Size : 10,59 MB
Release : 2005-04-26
Category : Computers
ISBN : 9780849333460
The risk management process supports executive decision-making, allowing managers and owners to perform their fiduciary responsibility of protecting the assets of their enterprises. This crucial process should not be a long, drawn-out affair. To be effective, it must be done quickly and efficiently. Information Security Risk Analysis, Second Edition enables CIOs, CSOs, and MIS managers to understand when, why, and how risk assessments and analyses can be conducted effectively. This book discusses the principle of risk management and its three key elements: risk analysis, risk assessment, and vulnerability assessment. It examines the differences between quantitative and qualitative risk assessment, and details how various types of qualitative risk assessment can be applied to the assessment process. The text offers a thorough discussion of recent changes to FRAAP and the need to develop a pre-screening method for risk assessment and business impact analysis.
Author :
Publisher :
Page : 426 pages
File Size : 19,73 MB
Release : 1995
Category : Computer security
ISBN :
Author : BPI Information Services
Publisher : Bpi Information Services
Page : 64 pages
File Size : 27,14 MB
Release : 1993-01-01
Category :
ISBN : 9781579791896
This report presents security procedures and techniques that constitute good practices in the design, development, testing and operation of EC systems. Principles of risk management and definition of parameters for quantitative risk assessments are provided. Some security techniques considered include audit trails, contingency planning, use of acknowledgments, electronic document management, activities of supporting networks, user access controls to systems and networks, and cryptographic techniques for authentication and confidentiality.