Table of Contents

Cover image

Title page

Copyright

Dedication

Author Biography

Introduction

Book overview and key learning points

Book audience

How this book is organized

Conclusion

Chapter 1. What is Information Security?

Introduction

What is security?

Alert!

Models for discussing security

More advanced

Alert!

Attacks

Defense in depth

Information security in the real world

Summary

Exercises

References

Chapter 2. Identification and Authentication

Introduction

Identification

Authentication

More advanced

Additional resources

Alert!

Identification and authentication in the real world

Summary

Exercises

References

Chapter 3. Authorization and Access Control

Introduction

Authorization

Access control

More advanced

More advanced

Alert!

More advanced

Alert!

Access control methodologies

More advanced

Authorization and access control in the real world

Summary

Exercises

References

Chapter 4. Auditing and Accountability

Introduction

Accountability

More advanced

Auditing

Alert!

Accountability and auditing in the real world

More advanced

Summary

Exercises

References

Chapter 5. Cryptography

Introduction

History

More advanced

Additional resources

Modern cryptographic tools

More advanced

Protecting data at rest, in motion, and in use

Alert!

Cryptography in the real world

Summary

Exercises

References

Chapter 6. Laws and Regulations

Introduction

Laws and regulations

Compliance

Privacy

Summary

Questions

References

Chapter 7. Operations Security

Introduction

Alert!

Origins of operations security

Additional resources

The operations security process

Haas’ Laws of operations security

More advanced

Operations security in our personal lives

Alert!

Operations security in the real world

Summary

Exercises

References

Chapter 8. Human Element Security

Introduction

Humans: the weak link

Security awareness

The security awareness and training program

Summary

Exercises

References

Chapter 9. Physical Security

Introduction

Alert!

Additional resources

Physical security controls

Protecting people

Protecting data

More advanced

Protecting equipment

Note

Physical security in the real world

Summary

Exercises

References

Chapter 10. Network Security

Introduction

Protecting networks

Protecting network traffic

Mobile device security

Network security tools

More advanced

Additional resources

Network security in the real world

Summary

Exercises

References

Chapter 11. Operating System Security

Introduction

Operating system hardening

Protecting against malware

Additional resources

More advanced

Software firewalls and host intrusion detection

Operating system security tools

Alert!

Operating system security in the real world

Summary

Exercises

References

Chapter 12. Application Security

Introduction

The TJX breach

Software development vulnerabilities

Additional resources

Web security

Alert!

More advanced

Database security

Additional resources

Application security tools

More advanced

Application security in the real world

Summary

Exercises

References

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.75.217