ABSTRACT

This book begins with an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

part |2 pages

SECTION I: SECURITY CONCEPTS

chapter 1|20 pages

USING MODELS

chapter 2|18 pages

DEFINING INFORMATION SECURITY

chapter 3|16 pages

INFORMATION AS AN ASSET

part |2 pages

PART II: THE McCUMBER CUBE METHODOLOGY

chapter 6|12 pages

THE McCUMBER CUBE

chapter 10|12 pages

MANAGING THE SECURITY LIFE CYCLE

chapter 11|20 pages

SAFEGUARD ANALYSIS

chapter |2 pages

SECTION III: APPENDICES