相關主題
商品描述
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary book is intended for business and technology audiences, at student or experienced levels.
Organizations must first understand the particular threats that an organization may be prone to, including different types of security attacks, social engineering, and fraud incidents, as well as addressing applicable regulation and security standards. This international edition covers Payment Card Industry Data Security Standard (PCI DSS), American security regulation, and European GDPR. Developing a risk profile helps to estimate the potential costs that an organization may be prone to, including how much should be spent on security controls.
Security planning then includes designing information security, as well as network and physical security, incident response and metrics. Business continuity considers how a business may respond to the loss of IT service. Optional areas that may be applicable include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics.
This book targets professionals in business, IT, security, software development or risk. This text enables computer science, information technology, or business students to implement a case study for an industry of their choosing.
.
商品描述(中文翻譯)
這本書展示了資訊安全需要深入了解組織的資產、威脅和流程,並結合能夠最佳保護組織安全的技術。它提供了逐步指導,說明如何從安全的角度分析業務流程,同時介紹安全概念和技術,以發展安全技術的需求和設計。這本跨學科的書籍旨在針對商業和技術讀者,無論是學生還是有經驗的專業人士。
組織必須首先了解其可能面臨的特定威脅,包括不同類型的安全攻擊、社會工程和詐騙事件,以及遵循適用的法規和安全標準。本國際版涵蓋了支付卡產業數據安全標準(PCI DSS)、美國安全法規和歐洲通用數據保護條例(GDPR)。發展風險概況有助於估算組織可能面臨的潛在成本,包括應該在安全控制上花費多少。
安全規劃隨後包括設計資訊安全、網路和物理安全、事件響應和指標。業務持續性考慮企業如何應對IT服務的喪失。可能適用的選擇性領域包括數據隱私、雲安全、零信任、安全軟體需求和生命週期、治理、入門取證和倫理。
這本書的目標讀者是商業、IT、安全、軟體開發或風險領域的專業人士。本書使計算機科學、資訊技術或商業的學生能夠為他們選擇的行業實施案例研究。
作者簡介
作者簡介(中文翻譯)
蘇珊·林克(Susan Lincke)博士是一位認證資訊系統審計師,擁有業界和學術經驗,能夠了解業界中重要的事物以及如何教授這些知識。該材料由國家科學基金會(National Science Foundation)資助,學生們為真實的社區夥伴規劃安全措施。