ABSTRACT
Every year, in response to advancements in technology and new laws in different countries and regions, there are many changes and updates to the body of knowledge required of IT security professionals. Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most
TABLE OF CONTENTS
part |2 pages
ACCESS CONTROL Access Control Administration
part |2 pages
TELECOMMUNICATIONS AND NETWORK SECURITY Communications and Network Security
part |2 pages
Network Attacks and Countermeasures
part |2 pages
INFORMATION SECURITY AND RISK MANAGEMENT Security Management Concepts and Principles
part |2 pages
Policies, Standards, Procedures, and Guidelines
part |2 pages
Risk Management
part |2 pages
APPLICATION SECURITY System Development Controls
part |2 pages
CRYPTOGRAPHY Crypto Concepts, Methodologies, and Practices
part |2 pages
SECURITY ARCHITECTURE AND DESIGN Principles of Computer and Network Organizations, Architectures, and Designs
part |2 pages
OPERATIONS SECURITY Operations Controls
part |2 pages
BUSINESS CONTINUITY PLANNING AND DISASTER RECOVERY PLANNING Business Continuity Planning
part |2 pages
LAW, REGULATIONS, COMPLIANCE, AND INVESTIGATION Major Categories of Computer Crime
part |2 pages
Incident Handling
part |2 pages
PHYSICAL SECURITY Elements of Physical Security