logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Assessing and Managing Security Risk in IT Systems : A Structured Methodology

Assessing and Managing Security Risk in IT Systems : A Structured Methodology (Hardcover)

John McCumber (지은이)
Auerbach Pub
171,520원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
140,640원 -18% 0원
7,040원
133,600원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Assessing and Managing Security Risk in IT Systems : A Structured Methodology
eBook 미리보기

책 정보

· 제목 : Assessing and Managing Security Risk in IT Systems : A Structured Methodology (Hardcover) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 일반
· ISBN : 9780849322327
· 쪽수 : 288쪽
· 출판일 : 2004-08-12

목차

SECURITY CONCEPTSUsing ModelsIntroduction: Understanding, Selecting, and Applying Models Understanding AssetsLayered Security Using Models in Security Security Models for Information Systems Shortcomings of Models in SecuritySecurity in Context Reference Defining Information SecurityConfidentiality, Integrity, and Availability Information AttributesIntrinsic versus Imputed Value Information as an Asset The Elements of Security Security Is Security Only in Context Information as an Asset Introduction Determining Value Managing Information Resources ReferencesUnderstanding Threat and Its Relation to Vulnerabilities Introduction Threat Defined Analyzing Threat Assessing Physical Threats Infrastructure Threat IssuesAssessing Risk Variables: The Risk Assessment Process Introduction Learning to Ask the Right Questions about RiskThe Basic Elements of Risk in IT Systems Information as an Asset Defining Threat for Risk ManagementDefining Vulnerabilities for Risk Management Defining Safeguards for Risk ManagementThe Risk Assessment Process THE McCUMBER CUBE METHODOLOGYThe McCumber CubeIntroduction The Nature of InformationCritical Information Characteristics Confidentiality IntegrityAvailability Security MeasuresTechnology Policy and Practice Education, Training, and Awareness (Human Factors) The Model ReferencesDetermining Information States and MappingInformation Flow Introduction Information States: A Brief Historical Perspective Automated Processing: Why Cryptography Is Not SufficientSimple State Analysis Information States in Heterogeneous Systems Boundary Definition Decomposition of Information StatesDeveloping an Information State MapReference Decomposing the Cube for Security Enforcement Introduction A Word about Security PolicyDefinitions The McCumber Cube Methodology The Transmission StateThe Storage State The Processing StateRecap of the MethodologyInformation State Analysis for Components andSubsystemsIntroduction Shortcomings of Criteria Standards for Security AssessmentsApplying the McCumber Cube Methodology for ProductAssessments Steps for Product and Component Assessment Information Flow Mapping Cube Decomposition Based on Information States Develop Security Architecture Recap of the Methodology for Subsystems, Products, andComponentsReferencesManaging the Security Life CycleIntroduction Safeguard Analysis Introduction Technology SafeguardsProcedural Safeguards Human Factors SafeguardsAssessing and Managing Security Risk in IT SystemsVulnerability-Safeguard Pairing Hierarchical Dependencies of Safeguards Security Policies and Procedural Safeguards Developing Comprehensive Safeguards: The Lessons of the Shogun Identifying and Applying Appropriate SafeguardsComprehensive Safeguard Management: Applying theMcCumber Cube The ROI of Safeguards: Do Security Safeguards Have a Payoff?Practical Applications of McCumber Cube AnalysisIntroduction Applying the Model to Global and National Security IssuesProgramming and Software DevelopmentUsing the McCumber Cube in an Organizational InformationSecurity Program Using the McCumber Cube for Product or Subsystem AssessmentUsing the McCumber Cube for Safeguard Planning and Deployment Tips and Techniques for Building Your Security Program Establishing the Security Program: Defining You Avoiding the Security Cop Label Obtaining Corporate Approval and Support Creating Pearl Harbor FilesDefining Your Security PolicyDefining What versus HowSecurity Policy: Development and ImplementationReference SECTION III APPENDICESVulnerabilities Risk Assessment MetricsDiagrams and TablesOther Resources

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책