A strategicbased approach written by authors timothy j. Provides very current view of the emerging standards of practice in information security. Buy the paperback book introduction to information security. Most introductory texts provide a technologybased survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and. Before exploring analysis methods, the chapter includes some guidance for nonanalysts as to what can be expected from. A strategicbased approach, authors timothy shimeall and jonathan spring of cert are able to provide an exploratory text about the topic without getting bogged down in the more elementary items. A strategicbased approach by timothy shimeall at indigo. An information security strategy recognizes the facts of the competitive environment, and of supplier and customer needs. Introduction to information security a strategicbased. The authors provide a strategybased introduction to providing defenses as a basis for engineering and riskmanagement decisions in the defense of information. A strategicbased approach most introductory texts provide a technologybased survey of methods and techniques that leaves the reader without. Michael nieles kelley dempsey victoria yan pillitteri. Provides a broad introduction to the methods and techniques in the field of information security.
A strategicbased approach april 2014 book timothy j. The following is an excerpt from the book introduction to information security. Cybersecurity lexicon statistical methods in counterterrorism sscp isc2 systems security certified practitioner official study guide foundations and practice of security the valuesbased safety process securing windows server 2003 ccna security exam cram. An information security strategy supports broader business goals in successfully adapting to these external challenges. Certain external environmental factors specifically influence information security. Ebooks related to introduction to information security. This chapter provides an introduction to the osi model as a method of contextualizing network operations and to provide a mental model. Introduction to information security sciencedirect. The paper reflects an approach in which useful information provided by the services is sent out directly from the creators of information to the consumers. Most introductory books about information security are about the size of this book, but are often written at a far too basic level. An example of accidental exposure of personal information becoming a strategic security risk is when the wife of a british intelligence head posted personal family details on facebook. Offers a strategybased view of these tools and techniques, facilitating selection of overlapping methods for indepth defense of information. The book provides a good balance between the broad aspects of information security, privacy and risk management. A strategic based approach by timothy shimeall and jonathan spring, published by elsevier science and technology books.
898 1078 287 1009 662 749 1408 128 1047 377 167 1069 1329 1301 1400 346 1199 562 1371 919 734 982 730 1619 1326 1251 1572 1646 1590 378 1069 306 496 1006 890 1001 722 1164 1424 718 1000 625 306 1170 402