SUSTAINABLE DEVELOPMENT
Innovate. Sustain. Transform.
Save up to 30% on top Physical Sciences & Engineering titles!

The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of inform… Read more
SUSTAINABLE DEVELOPMENT
Save up to 30% on top Physical Sciences & Engineering titles!
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use.
The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom.
This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.
Security Consultants, IT Managers, Students, Those new to the InfoSec field
Chapter 1. What is Information Security?
What is Security?
Models for Discussing Security Issues
Confidentiality, Integrity, and Availability
Attacks
Defense in Depth
Chapter 2. Identification and Authentication
Identification
Authentication
Chapter 3. Authorization and Access control
Authorization
Access Control
Access Control Methodologies
Chapter 4. Auditing and Accountability
Accountability
Auditing
Chapter 5. Cryptography
History
Modern Cryptographic Tools
Protecting Data at Rest, in Motion, and in Use
Chapter 6. Operations security
Origins of Operations Security
The Operations Security Process
Laws of Operations Security
Operations Security in our Personal Lives
Chapter 7. Physical security
Physical Security Measures
Protecting People
Protecting Data
Protecting Equipment
Chapter 8. Network security
Protecting Network Borders
Protecting Network Traffic
Network Security Tools
Chapter 9. Operating System security
Operating System Hardening
Anti-Malware Tools
Software Firewalls and Host Intrusion Detection
Operating System Security Tools
Chapter 10. Application security
Software Vulnerabilities
Web Security
Database Security
Application Security Tools
JA