information systems security: security management, metrics, frameworks and best practices

10
A new release from Wiley India 1 Visit: www.wileyindia.com

Upload: wiley-india-private-limited

Post on 06-Nov-2014

9.668 views

Category:

Education


9 download

DESCRIPTION

Information and communication systems can be exposed to intrusion and risks, within the overall architecture and design of these systems. These areas of risks can span the entire gamut of information systems including databases, networks, applications, internet-based communication, web services, mobile technologies and people issues associated with all of them. It is vital for businesses to be fully aware of security risks associated with their systems as well as the regulatory body pressures; and develop and implement an effective strategy to handle those risks. This book covers all of the aforementioned issues in depth. It covers all significant aspects of security, as it deals with ICT, and provides practicing ICT security professionals explanations to various aspects of information systems, their corresponding security risks and how to embark on strategic approaches to reduce and, preferably, eliminate those risks. Written by an experienced industry professional working in the domain, with extensive experience in teaching at various levels as well as research, this book is truly a treatise on the subject of Information Security.

TRANSCRIPT

Page 1: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

A new release from Wiley India

1Visit: www.wileyindia.com

Page 2: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

2Visit: www.wileyindia.com

Written by an experienced industry professional working in the

domain, a professional with extensive experience in teaching

at various levels (student seminars, industry workshops) as

well as research.Covers SOX and SAS 70 aspects for Asset Management

in the context of Information Systems Security.

A comprehensive treatment and truly a treatise on the subject of Information Security

Page 3: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

3Visit: www.wileyindia.com

Useful text for CSQA, CISA and CISM aspirants.

Detailed explanation of topics "Privacy" and "Biometric

Controls".

Review questions and reference material pointers after each

chapter.

Ample figures to illustrate key points – over 250 figures!

IT Risk Analysis covered

Page 4: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

4Visit: www.wileyindia.com

Page 5: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

Nina Godbole has vast experience in the IT industry – SystemAnalysis & Design and Development, as well as ApplicationSupport Services, MIS, IT Perspective Planning Training, SecurityAudits, Quality Management, Operations Management. Nina hasalso led BPR initiatives and has played an instrumental role insuccessfully driven organizational initiatives - the ISO 9001, PCMM and CMM-I. She is an active member of many professionalbodies and academic research groups.

Nina holds a Masters Degree from IIT and MS Engineering (Computer

Science) degree from Newport University, USA. She is a CQA, CSTE,

CISA, PMP and ITIL Foundation Certified professional.

5Visit: www.wileyindia.com

Page 6: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

Chapter 1: Information Systems in Global ContextChapter 2: Threats to Information SystemsChapter 3: Security Considerations in Mobile and Wireless

ComputingChapter 4: Information Security Management in OrganizationsChapter 5: Building Blocks of Information SecurityChapter 6: Information Security Risk AnalysisChapter 7: Overview of Physical Security for Information

SystemsChapter 8: Perimeter Security for Physical ProtectionChapter 9: Biometrics Controls for SecurityChapter 10: Biometrics-based Security: Issues and ChallengesChapter 11: Network Security in PerspectiveChapter 12: Networking and Digital Communication

FundamentalsChapter 13: Cryptography and EncryptionChapter 14: Intrusion Detection for Securing the Networks

6Visit: www.wileyindia.com

Page 7: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

Chapter 15: Firewalls for Network ProtectionChapter 16: Virtual Private Networks for SecurityChapter 17: Security of Wireless NetworksChapter 18: Business Applications Security: An EAI PerspectiveChapter 19: Security of Electronic Mail SystemsChapter 20: Security of DatabasesChapter 21: Security of Operating SystemsChapter 22: Security Models, Frameworks, Standards andMethodologiesChapter 23: ISO 17799/ISO 27001Chapter 24: Systems Security Engineering Capability Maturity

Model– The SSE-CMMChapter 25: COBIT, COSO-ERM and SAS 70Chapter 26: Information Security: Other Models and

MethodologiesChapter 27: Laws and Legal Framework for Information SecurityChapter 28: Security Metrics

7Visit: www.wileyindia.com

Page 8: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

Chapter 29: Privacy - Fundamental Concepts and Principles

Chapter 30: Privacy - Business ChallengesChapter 31: Privacy - Technological ImpactsChapter 32: Web Services and PrivacyChapter 33: Staffing the Security FunctionChapter 34: Business Continuity and Disaster Recovery

PlanningChapter 35: Auditing for SecurityChapter 36: Privacy Best Practices in OrganizationsChapter 37: Asset ManagementChapter 38: Ethical Issues and Intellectual Property

Concerns forInfoSec Professionals

8Visit: www.wileyindia.com

Page 9: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

9Visit: www.wileyindia.com

37 appendices with checklists, guidelines and more, on the topics covered.

17 case illustrations to help readers appreciate/reinforce the

understanding of the concepts.

Workshop Mapping document with ideas for mapping contents of chapters to

workshops/seminars on security and privacy.

Page 10: Information Systems Security: Security Management, Metrics, Frameworks and Best Practices

ISBN: 978-81-265-1692-6 Information Systems Security:

Security Management, Metrics, Frameworks and Best Practices

Price: Rs 549/- Pages: 1020

Visit: www.wileyindia.com 10