Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Assurance: Security in the Information Environment (Computer Communications and Networks)

Buy
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare, it re-examines why organisations need to take information assurance seriously, and discusses the business, legal, and technical knowledge needed to secure these vital government and business assets. Key topics include: The role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; International standards, policies and security acts. "A refreshingly clear & wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised." (Dr. Andy Jones, Research Group Leader, BT Group Chief Technology Office UK)

When you first hear the term information assurance you tend to conjure up an image of a balanced set of reasonable measures that have been taken to protect the information after an assessment has been made of risks that are posed to it. In truth, this is the Holy Grail that all organisations that value their information should strive to achieve, but which few even understand.

Information assurance is a term that has recently come into common use. When talking with old timers in IT (or at least those that are over 35-year old), you will hear them talking about information security, a term that has survived since the birth of the computer. In the recent past, the term information warfare was coined to describe the measures that need to be taken to defend and attack information. This term, however, has military connotations – after all, warfare is normally their domain. Shortly after the term came into regular use, it was applied to a variety of situations encapsulated by Winn Schwartau as the following three classes of information warfare:

Class 1: Personal information warfare
Class 2: Corporate information warfare
Class 3: Global information warfare

Political sensitivities lead to “warfare” being replaced by the “operations”, a much more “politically correct” word. Unfortunately, “operations” also has an offensive connotation and is still the terminology of the military and governments. A term was needed that described the measures needed to safeguard the most precious asset in this modern, connected world – information. The measures are much more than just security, encompassing the concepts of risk assessment, management and the protection of your information from compromise, theft, modification and lack of availability.
(HTML tags aren't allowed.)

The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley,...

Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives
Information Assurance and Security Ethics in Complex Systems: Interdisciplinary Perspectives

Often computers are viewed as machines that run algorithms. This view of computers covers a vast range of devices, from simple computers that perform limited and specific computations (for example, a computer found in a wristwatch) to supercomputers, which are groups of computers linked together in homogeneous and heterogeneous clusters and...

The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Second Edition (Springer Series in Statistics)
The Elements of Statistical Learning: Data Mining, Inference, and Prediction, Second Edition (Springer Series in Statistics)

This book describes the important ideas in a variety of fields such as medicine, biology, finance, and marketing in a common conceptual framework. While the approach is statistical, the emphasis is on concepts rather than mathematics. Many examples are given, with a liberal use of colour graphics. It is a valuable resource...


101 Facts You Should Know About Food
101 Facts You Should Know About Food

Food is the one thing none of us can do without. Fortunately very few of us in the developed world ever have to. Yet strangely, in these times of plenty, food is talked about more and more. In the past, most people had very little choice over what they ate. Nowadays, we are genuinely spoiled for choice. Supermarkets provide a year-round...

Introduction to Social Media Marketing: A Guide for Absolute Beginners
Introduction to Social Media Marketing: A Guide for Absolute Beginners
Easily understand the most important tools and skills in social media marketing. You'll be exposed to Facebook pages and ads, work with Twitter and LinkedIn, save time with Hootsuite, and learn social media monitoring.  If you are completely new to social media marketing and you want to learn the basics, this guide will...
Pair Programming Illuminated
Pair Programming Illuminated

Pair programming is a simple, straightforward concept. Two programmers work side-by-side at one computer, continuously collaborating on the same design, algorithm, code, and test. It produces a higher quality of code in about half the time than that produced by the summation of their solitary efforts. However, nothing is simple...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy