
The Basics of Information Security
Understanding the Fundamentals of InfoSec in Theory and Practice
- 1st Edition - June 10, 2011
- Imprint: Syngress
- Author: Jason Andress
- Language: English
- Paperback ISBN:9 7 8 - 1 - 5 9 7 4 9 - 6 5 3 - 7
- eBook ISBN:9 7 8 - 1 - 5 9 7 4 9 - 6 5 4 - 4
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of inform… Read more

Purchase options

Institutional subscription on ScienceDirect
Request a sales quoteThe Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use.
The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom.
This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.
- Learn about information security without wading through huge manuals
- Covers both theoretical and practical aspects of information security
- Gives a broad view of the information security field for practitioners, students, and enthusiasts
Security Consultants, IT Managers, Students, Those new to the InfoSec field
Chapter 1. What is Information Security?
What is Security?
Models for Discussing Security Issues
Confidentiality, Integrity, and Availability
Attacks
Defense in Depth
Chapter 2. Identification and Authentication
Identification
Authentication
Chapter 3. Authorization and Access control
Authorization
Access Control
Access Control Methodologies
Chapter 4. Auditing and Accountability
Accountability
Auditing
Chapter 5. Cryptography
History
Modern Cryptographic Tools
Protecting Data at Rest, in Motion, and in Use
Chapter 6. Operations security
Origins of Operations Security
The Operations Security Process
Laws of Operations Security
Operations Security in our Personal Lives
Chapter 7. Physical security
Physical Security Measures
Protecting People
Protecting Data
Protecting Equipment
Chapter 8. Network security
Protecting Network Borders
Protecting Network Traffic
Network Security Tools
Chapter 9. Operating System security
Operating System Hardening
Anti-Malware Tools
Software Firewalls and Host Intrusion Detection
Operating System Security Tools
Chapter 10. Application security
Software Vulnerabilities
Web Security
Database Security
Application Security Tools
- Edition: 1
- Published: June 10, 2011
- No. of pages (eBook): 208
- Imprint: Syngress
- Language: English
- Paperback ISBN: 9781597496537
- eBook ISBN: 9781597496544
JA