Principles of information systems security: text and cases
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Hoboken, NJ
Wiley
2007
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 451 S. Ill., graph. Darst. |
ISBN: | 0471450561 9780471450566 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV020040649 | ||
003 | DE-604 | ||
005 | 20081222 | ||
007 | t | ||
008 | 050922s2007 ad|| |||| 00||| eng d | ||
020 | |a 0471450561 |c (cloth) |9 0-471-45056-1 | ||
020 | |a 9780471450566 |c (cloth) |9 978-0-471-45056-6 | ||
035 | |a (OCoLC)255417368 | ||
035 | |a (DE-599)BVBBV020040649 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Dhillon, Gurpreet |d 1963- |e Verfasser |0 (DE-588)133113868 |4 aut | |
245 | 1 | 0 | |a Principles of information systems security |b text and cases |c Gurpreet Dhillon |
264 | 1 | |a Hoboken, NJ |b Wiley |c 2007 | |
300 | |a XII, 451 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Informationssystem |0 (DE-588)4072806-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informationssystem |0 (DE-588)4072806-7 |D s |
689 | 0 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | 2 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |C b |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UBRegensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-013361739 |
Datensatz im Suchindex
_version_ | 1804133612240502784 |
---|---|
adam_text | CONTENTS
PREFACE V
CHAPTER
NATURE AND SCOPE
Coordination in Threes
Security in Threes
Technical Controls
Formal Controls
Informal Controls
Institutionalizing Security
in Organizations
Questions and Exercises
Case Study
PARTI
TECHNICAL ASPECTS OF INFORMATION
SYSTEMS SECURITY
CHAPTER
SYSTEMS IN ORGANIZATIONS:
AN INTRODUCTION
Vulnerabilities
Data Security Requirements
Methods of Defense
Encryption
Software Controls
Physical and Hardware Controls
Concluding Remarks
Questions and Exercises
Case Study
CHAPTER
SPECIFICATION OF INFORMATION SYSTEMS
SECURITY
Models for Security Specification
Evaluation Criteria and Their Context
BellLaPadula
Denning Information Flow Model
The Reference Monitor
and Rushby s Solution
Away from the Military
Military and Nonmilitary: Toward Integrity
Toward Integrity: Biba, Clark-Wilson,
and Chinese Walls
Biba
The Clark-Wilson Model
Emergent Issues
Questions and Exercises
Case Study
CHAPTER
INFORMATION SYSTEMS SECURITY
Cryptography
Cryptanalysis
Basics of Cryptanalysis
Using Digrams for Cryptanalysis
Conventional Encryption Algorithms
Data Encryption Standard
IDEA
CAST
AES
Asymmetric Encryption
Authentication of the Sender
RSA
Questions and Exercises
Case Study
CHAPTERS NETWORK SECURITY
TCP/IP Protocol Architecture
LAN Security
Security and TCP/IP Protocol
Architecture
Operating-System-based Attacks
Network-based Attacks
Securing Systems
Securing the File System
Securing Access from the Network
Questions and Exercises
Case Study
ix
CONTENTS
PART 11
FORMAL
SYSTEMS
CHAPTER
SYSTEMS IN ORGANIZATIONS:
AN INTRODUCTION
Formal IS Security Dimensions
Responsibility and Authority Structures
Organizational Buy-In
Security Policy
Concluding Remarks
Questions and Exercises
Case Study
CHAPTER
SYSTEMS SECURITY
Security Strategy Levels
Classes of Security Decisions in Firms
Strategic Decisions
Administrative Decisions
Operational Decisions
Prioritizing Decisions
Security Planning Process
Orion Strategy Process Overview
IS Security Planning Principles
Summary
Questions and Exercises
Case Study
CHAPTER
SYSTEMS SECURITY
Security Breaches in Systems
Development
Control Structures
Auditing
Application Controls
Modeling Controls
Documentation Controls
Process Improvement Software
The SSE-CMM
Key Constructs and Concepts
in SSE-CMM
Organization and Projects
System
Work Product
Customer
Process
Process Area
Role Independence
Process Capability
Institutionalization
Process Management
Capability Maturity Model
SSE-CMM Architecture Description
Basic Model
Concluding Remarks
Questions and Exercises
Case Study
CHAPTER
INFORMATION SYSTEMS SECURITY
Risk Assessment
System Characterization
Threat Identification
Vulnerability Identification
Control Analysis
Likelihood Determination and
Impact Analysis
Risk Determination
Control Recommendations and Results
Documentation
Risk Mitigation
Control Categories
Risk Evaluation and Assessment
COBRA: Hybrid Model for Software
Cost Estimation, Benchmarking,
and Risk Assessment
The I2S2 Model
Three Levels of I2S2 Model
Six Components of I2S2 Model
Concluding Remarks
Questions and Exercises
Case Study
PART III
INFORMAL ASPECTS OF INFORMATION
SYSTEMS SECURITY
CHAPTER
IN ORGANIZATIONS: AN INTRODUCTION
The Concept of Pragmatics
and IS Security
What Is Pragmatics?
CONTENTS
Nature of IS Security at the Pragmatic
Level
Informal Behavior
Concluding Remarks
Questions and Exercises
Case Study
CHAPTER
FOR IS SECURITY
What Is Corporate Governance?
Models of Corporate Governance:
Civic Republicanism
An Opposing View: Liberalism
Enter the Corporation
The Science of Management:
Enter the Professional Manager
Professional Managers as
Trustees of Society
The New Power Elite: The Managerial
Technocracy
Minding the Minders: Contractual
Shareholder Model
Analysis of the Structure
of American Corporations
Owners
Board of Directors
CEO and Executives
Corporate Governance for IS Security 206
Security Governance Principles
Constructing Information System
Security Governance
Concluding Remarks
Questions and Exercises
Case Study
CHAPTER
SYSTEMS SECURITY
Security Culture
Silent Messages and IS Security
Security Culture Framework
OECD
Concluding Remarks
Questions and Exercises
Case Study
PART IV
REGULATORY ASPECTS OF
INFORMATION SYSTEMS SECURITY
CHAPTER
STANDARDS
ISO
ISO
The Rainbow Series
ITSEC
International Harmonization
Common Criteria
Common Problems with CC
Other Miscellaneous Standards
and Guidelines
RFC 2196 Site Security Handbook
ISO/IECTR 1
for the Management of IT Security
Generally Accepted Information
Security Principles (GAISP)
OECD
of Information Systems
Concluding Remarks
Questions and Exercises
Case Study
CHAPTER
SYSTEMS SECURITY
Computer Fraud and Abuse Act
Computer Security Act (CSA)
Health Insurance Portability
and Accountability Act (HIPAA)
Requirements
Compliance and Recommended Protection
HIPAA: Help or Hindrance?
USA Patriot Act
IT and the Act
Sarbanes-OxleyAct(SOX)
IT-Specific Issues
Federal Information Security
Management Act
Concluding Remarks
Questions and Exercises
Case Study
Xi i CONTENTS
CHAPTER IS COMPUTER FORENSICS
The Basics
Types and Scope of Crimes
Lack of Uniform Law
What Is Computer Forensics?
Gathering Forensic Evidence
Formal Procedure for Gathering Data
Law Dictating Formal Procedure
Laws Governing Seizure of Evidence
Law Governing Analysis
and Presentation of Evidence
Emergent Issues
International Arena
National Arena
Concluding Remarks
Questions and Exercises
Case Study I
Case Study
CHAPTER
INFORMATION SYSTEMS SECURITY
Principles for Technical Aspects
of IS Security
Principles for Formal Aspects
of IS Security
Principles for Informal Aspects
of IS Security
Concluding Remarks
CASES
1.
2.
3.
4.
5.
6.
Bank
7.
Burnham Lambert
8.
9.
Breach
10.
M&M Procurement, Inc.
INDEX
|
any_adam_object | 1 |
author | Dhillon, Gurpreet 1963- |
author_GND | (DE-588)133113868 |
author_facet | Dhillon, Gurpreet 1963- |
author_role | aut |
author_sort | Dhillon, Gurpreet 1963- |
author_variant | g d gd |
building | Verbundindex |
bvnumber | BV020040649 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)255417368 (DE-599)BVBBV020040649 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01659nam a2200421 c 4500</leader><controlfield tag="001">BV020040649</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20081222 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">050922s2007 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471450561</subfield><subfield code="c">(cloth)</subfield><subfield code="9">0-471-45056-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471450566</subfield><subfield code="c">(cloth)</subfield><subfield code="9">978-0-471-45056-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255417368</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020040649</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Dhillon, Gurpreet</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)133113868</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Principles of information systems security</subfield><subfield code="b">text and cases</subfield><subfield code="c">Gurpreet Dhillon</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hoboken, NJ</subfield><subfield code="b">Wiley</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 451 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informationssystem</subfield><subfield code="0">(DE-588)4072806-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UBRegensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013361739</subfield></datafield></record></collection> |
id | DE-604.BV020040649 |
illustrated | Illustrated |
indexdate | 2024-07-09T20:11:29Z |
institution | BVB |
isbn | 0471450561 9780471450566 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013361739 |
oclc_num | 255417368 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | XII, 451 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley |
record_format | marc |
spelling | Dhillon, Gurpreet 1963- Verfasser (DE-588)133113868 aut Principles of information systems security text and cases Gurpreet Dhillon Hoboken, NJ Wiley 2007 XII, 451 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computer networks Security measures Computer security Computersicherheit (DE-588)4274324-2 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf Informationssystem (DE-588)4072806-7 gnd rswk-swf Informationssystem (DE-588)4072806-7 s Datensicherung (DE-588)4011144-1 s Computersicherheit (DE-588)4274324-2 s b DE-604 Digitalisierung UBRegensburg application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Dhillon, Gurpreet 1963- Principles of information systems security text and cases Computer networks Security measures Computer security Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4011144-1 (DE-588)4072806-7 |
title | Principles of information systems security text and cases |
title_auth | Principles of information systems security text and cases |
title_exact_search | Principles of information systems security text and cases |
title_full | Principles of information systems security text and cases Gurpreet Dhillon |
title_fullStr | Principles of information systems security text and cases Gurpreet Dhillon |
title_full_unstemmed | Principles of information systems security text and cases Gurpreet Dhillon |
title_short | Principles of information systems security |
title_sort | principles of information systems security text and cases |
title_sub | text and cases |
topic | Computer networks Security measures Computer security Computersicherheit (DE-588)4274324-2 gnd Datensicherung (DE-588)4011144-1 gnd Informationssystem (DE-588)4072806-7 gnd |
topic_facet | Computer networks Security measures Computer security Computersicherheit Datensicherung Informationssystem |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361739&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT dhillongurpreet principlesofinformationsystemssecuritytextandcases |