By John M. D. Hunter BA (Hons), FBCS, CEng (auth.)
Aimed essentially at ultimate yr undergraduate classes and MSc classes on details structures, administration of data platforms and layout of knowledge platforms, this textbook goals to supply solutions to 5 questions;
What is safety? What are the safety difficulties specific to an IT process? What should be performed to lessen the protection dangers linked to any such method? In a given state of affairs, what are the correct safeguard countermeasures? How should still one set approximately deciding to buy a knowledge method with safeguard implications?
It seems on the various objectives businesses may have in utilising protection suggestions (availability, integrity, confidentiality, exclusivity) and which procedure is most suitable to attaining every one target. With instructions acceptable for the security of either traditional advertisement and army platforms, An details safety Handbook should be of curiosity to computing device procedure managers and directors in any advertisement or executive organisation.
Read Online or Download An Information Security Handbook PDF
Best security books
Classes in management, in accordance with the management ideas utilized by Sir Ernest Shackleton from 1914-1916 to maintain himself and the lives of his workforce as they have been stranded on an Arctic ice stream. indicates the best way to practice that sort of power and patience to being a good chief in any box or task.
- Hacking Exposed: Network Security Secrets & Solutions
- Security and Intelligent Information Systems: International Joint Conferences, SIIS 2011, Warsaw, Poland, June 13-14, 2011, Revised Selected Papers
- CCNA Security (640-554) Portable Command Guide
- Germany's New Security Demographics: Military Recruitment in the Era of Population Aging
- Professional Penetration Testing: Creating and Operating a Formal Hacking Lab
- National Security and Human Health Implications of Climate Change
Additional resources for An Information Security Handbook
The rogue would then be able to use his private key to decrypt any messages he had intercepted addressed to Alice and Alice would not be able to decrypt them at all. To combat this threat, one should only use first-hand copies of public keys obtained from trustworthy public repositories. It would be nice to have a system which combined the simplicity and speed of a symmetric encryption system with the ease of administration of the RSA system. The Diffie-Hellman system allows such a compromise. In this arrangement, two players, Alice and Bob, wishing to have a private dialogue need to start by exchanging keys.
Th e main threats to such a syst em are sloppy procedures and irresponsible use of pass-keys . It should not be possible for an individual to get from th e publi c side of the perimeter fence into a safe in an office without th e assistance of anot her memb er of staff. If an employee loses his keyring which t hen finds its way into hostil e hands, it should not be possible for an unau th orised person to get access to th e conte nt s of any safe. In t he design of t he physical secur ity precautions , t here are a numb er of simple principles t hat need to be taken into account : • Wh erever possible, barriers should be in full view of secur ity personnel, eit her directly or by th e use of closed-circuit TV cameras .
All useful security is a defence against one or more specific threats. Security measures and procedures are far more likely to be effective if the personnel involved know about, and understand, these threats. Thus an important aspect of personnel security is the education of all personnel as to the security risks and the appropriate countermeasures. Part of this is briefing everyone on the security situation and providing credible answers to questions of the sort, "Why do we have to do... " Obviously it may not always be possible to answer such questions ; the decision as to whether it would be right to provide the answer is a matter of judgement between the risk of a security breach due to information being too widely disseminated on the one hand, and, a well-informed and motivated workforce on the other.