Skip navigation

Bookboon.com Last ned gratis eBøker og lærebøker

Choose a category

Information security for non-technical managers

Information security for non-technical managers
4,9 (23 vurderinger) Les omtaler
ISBN: 978-87-403-0488-6
1 utgave
Sider : 75
  • Pris: 75,50 kr
  • Pris: €8,99
  • Pris: £8,99
  • Pris: ₹150
  • Pris: $8,99
  • Pris: 75,50 kr
  • Pris: 75,50 kr

Last ned GRATIS med 4 enkle steg…

Vi beklager, men for å laste ned våre bøker eller se våre videoer må du ha en nettleser som støtter JavaScript.
Etter å ha oppgitt e-postadressen blir en bekreftelsesmail sendt til din mailbox. Vennligst godkjenn den for å motta vår ukentlig eBok-oppdatering. Eventuell kontaktinformasjon som blir oppgitt, vil ikke bli oppgitt til noen tredjepart.
eLib
Lås opp ditt selskaps læringspotensial
Se demo

Korporat eBibliotek

Utforsk våre Firmaløsninger for ansattes læring

Dette er en Premium-eBok

Bookboon Premium - Få tilgang til over 800 eBøker - uten annonser

Du kan få gratis tilgang til dette i én måned - og 800 andre bøker med Premium-abonnementet. Du kan også kjøpe boken nedenfor

  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: 39,99 kr p/m
  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: €5,99 p/m
  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: £4,99 p/m
  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: ₹299 p/m
  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: $3,99 p/m
  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: 39,99 kr p/m
  • Start en 30 dagers gratis prøveperiode. Etter prøveperioden: 39,99 kr p/m
eLib
Lås opp ditt selskaps læringspotensial
Klikk her!

Korporat eBibliotek

Utforsk våre Firmaløsninger for ansattes læring

Om boken

  1. Vurderinger
  2. Beskrivelse
  3. Innhold

Vurderinger

Andile Stulo ★★★★★

A very good read and information bank for all kinds of managers regardless of whether you have technical background or not. This is any manager's requirement to be successful.

Ronald J. Harrod ★★★★★

Comprehensive in content since it has included vital concepts to further discuss the main topic.

Stefano Baldi ★★★★★

Great book to be more aware on a critical issue which is too often not properly considered by professionals.

Beskrivelse

This book presents a non-technical overview of the main elements of managing information security, where everyone, not just technical people, has a role to play.

Modern economies are highly dependent on information systems and networks connected to “cyberspace” a virtual world with a population of several billion and growing.

Cyberspace is inherently insecure. Achieving acceptable information security requires building awareness of what it takes to achieve it, mitigating vulnerabilities in people, processes and technologies and constant adaptation to a rapidly changing environment.

Innhold

About the author

Introduction

  1. Information security in context
    1. A short history of information technologies and their side effects
    2. Why information security is increasingly important
    3. Ubiquity and irreversible dependencies
  2. Lessons identified in the last ten years
    1. The semantics of information security
    2. The major target areas in information insecurity
    3. What needs to be done to strengthen security is well known but not done well enough
    4. Certifications
    5. Asymmetries and consequences
    6. Maintaining security is everybody’s job
  3. Defining information security
    1. What is meant by “Information Security”
    2. Differences between Enterprise security, Information security and Information Technology security
  4. Managing information security in the enterprise
    1. Information Security Governance
    2. The components of information security governance
    3. Managing for security
    4. What makes a good Chief Information Security Officer (CISO)
    5. Your role as a manager
  5. The four domains of vulnerabilities
    1. Governance vulnerabilities
    2. People vulnerabilities
    3. Process vulnerabilities
    4. Technology vulnerabilities
  6. Other drivers of information insecurity
    1. Causes for concern
    2. External factors: the constantly changing landscape
    3. Information security should not inhibit innovative thinking
  7. Measuring security
    1. Measuring Information Security
    2. Reporting information security metrics
  8. Other information security topics
    1. Business Impact Analysis (BIA)
    2. Information Risk Management
    3. Planning for survival
    4. The legislative landscape
  9. Conclusions
  10. References
    1. Downloadable free of charge:
    2. Material requiring purchase
    3. Topics not covered in this book
  11. Appendix: Acknowledgements
  12. Endnotes
This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with EU regulation.