Publisher: Van Nostrand-Reinhold, 1993, 471 pages
ISBN: 0-442-00180-0
Keywords: Information Security
This guide shows how to protect against accidental and malicious damage to information systems resources. It also serves as a review for those planning to take the Certified Information Systems Security Practitioner (CISSP) examination.
Topics are organized in the same manner as the International Information System Security Certification Consortium, Inc. (ISC)**2 Common Body of Knowledge. Policies that protects against computer theft through illicit hacker networks, the spread of computer virus codes, computer fraud, and other threats are explained in chapters in:
The authors explain Rainbow Series controls and non-government access controls. They provide guidelines on risk management, safeguards, computer access control software, cryptography, and contingency planning. Among the new areas explored are:
Sections on legal and regulatory issues encompass federal and state computer crime laws, control of strategic materials, transborder data flow, guidelines on privacy of data, and ethical issues. Common "attacks" on information security are listed in the appendix and are cross-referenced to explanations of what happened and what action to take.
Information Systems Security meets the reference needs of information systems auditors, information systems managers, security officers, security analysts, and information security managers.
Extremely boring book, but it covers the subject OK. A bit dated now, though.
Comments
There are currently no comments
New Comment