Information Assurance

Security in the Information Environment

2nd Edition

By Andrew Blyth , Gerald L. Kovacich

Information Assurance Cover Image

  • ISBN13: 978-1-8462-8266-9
  • 280 Pages
  • User Level: Professionals
  • Publication Date: July 19, 2006
  • Available eBook Formats: PDF
  • eBook Price: $109.00
Buy eBook Buy Print Book Add to Wishlist
Full Description
This updated edition was written to help IT managers and assets protection professionals to assure the protection and availability of vital digital information and related information systems assets, and contains major updates and 3 new chapters. Bridging the gap between information security, information systems security and information warfare, it re-examines why organisations need to take information assurance seriously, and discusses the business, legal, and technical knowledge needed to secure these vital government and business assets. Key topics include: The role of the corporate security officer; Corporate cybercrime; Electronic commerce and the global marketplace; Cryptography; International standards, policies and security acts. 'A refreshingly clear & wide-ranging view of Information Assurance...this book not only explains what the problems are, it also gives you clear information on how to address the issues that have been raised.' (Dr. Andy Jones, Research Group Leader, BT Group Chief Technology Office UK)
Table of Contents

Table of Contents

  1. An Introduction to Information Assurance.
  2. What is Information Assurance?
  3. The World of Information.
  4. The Theory of Risks.
  5. The Information World of Crime.
  6. IA Trust and Supply Chains.
  7. Basic IA Concepts and Models.
  8. The Role of Policy in Information Assurance.
  9. IA in the World of Corporations.
  10. the Corporate Security Officer.
  11. Corporate Security Functions.
  12. IA in the Interest of National Security.
  13. The Coporate IA Officer.
  14. IA Organisational Functions.
  15. Incident Management and Response.
  16. Technical Aspects of IA.
  17. IA and Software.
  18. Applying Cryptography to IA.
  19. Information Technology Security.
  20. Security Standards.
  21. The Future.
  22. The Future and Final Thoughts.
  23. Appendices.
Errata

Please Login to submit errata.

No errata are currently published