Information Security Fundamentals
<P>Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise’s effort to build an effective security program. Following in the footsteps of its bestselling predecessor, <STRONG>Information Security Fundamentals, Second Edition </STRONG>provides<STRONG> </STRONG>information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.<BR><BR>The book examines the elements of computer security, employee roles and responsibilities, and common threats. It discusses the legal requirements that impact security policies, including Sarbanes-Oxley, HIPAA, and the Gramm-Leach-Bliley Act. Detailing physical security requirements and controls, this updated edition offers a sample physical security policy and includes a complete list of tasks and objectives that make up an effective information protection program.</P> <UL> <LI>Includes ten new chapters</LI> <LI>Broadens its coverage of regulations to include FISMA, PCI compliance, and foreign requirements</LI> <LI>Expands its coverage of compliance and governance issues</LI> <LI>Adds discussions of ISO 27001, ITIL, COSO, COBIT, and other frameworks</LI> <LI>Presents new information on mobile security issues</LI> <LI>Reorganizes the contents around ISO 27002</LI> <P></P></UL> <P>The book discusses organization-wide policies, their documentation, and legal and business requirements. It explains policy format with a focus on global, topic-specific, and application-specific policies. Following a review of asset classification, it explores access control, the components of physical security, and the foundations and processes of risk analysis and risk management.<BR><BR>The text concludes by describing business continuity planning, preventive controls, recovery strategies, and how to conduct a business impact analysis. Each chapter in the book has been written by a different expert to ensure you gain the comprehensive understanding of what it takes to develop an effective information security program.</P>