Information Security: Principles and Practices offers an introductory course and covers the practices and principles of information security.
Summary Of The Book
IT security is a vast and ever-changing field. Protecting computers from unauthorized access and malware attacks in an effective manner is a huge challenge today. With the high numbers of computer sales today, Information Security is of much significance. Information Security: Principles and Practices by Mark Merkow And Jim Breithaupt covers all the basic principles of Information Security.
Divided into 14 chapters, the book focuses on the Information Security Common Body of Knowledge. The book offers coverage on topics like Physical Security Control, Security Architecture and Models, Law, Investigations, and Ethics, Business Continuity Planning, Security Management, and Operations Security. Disaster Recovery Planning, Telecommunications, Network and Internet Security, Cryptography, Access Control Systems, and Methodology are also covered.
In the beginning, the book focuses on the Growing Importance of IT Security, the Principles of Security in Information Security, the Certification Programs, and Management of Security. The chapters that follow cover Management and Development of Security Policies, the Assurance Concepts of System Security, the IT Security Evaluation Criteria, and Integrity Models. The book also offers coverage on the different Types of Computer Crimes, the Computer and the Law, Computer Forensics, the Physical Security Threats, Operations Security, and Authentication.
The last few chapters of the book cover Constant Vigilance, Improving Security Across the SDLC, Intrusion Detection Systems, Network Security, the Strength of Cryptosystems, and Digital Cryptography. The book is inclusive of Appendices on Sample Policies, Common Body of Knowledge, and Security Policy. The authors have also included Chapter Objectives, Projects, Multiple Choice Questions, and Exercises.
Information Security: Principles and Practices was published in 2007.
About The Authors
Mark Merkow is a programmer, IT Security Professional, and writer. Other books by him include Computer Security Assurance Using the Common Criteria, The Complete Guide to Internet Security, Virtual Private Networks for Dummies, Building SET Applications for Secure Transactions, and Secure and Resilient Software Development.
Mark has previously served in the Information Security field for leading companies like ANSI X94 and NIST. He also offers online courses in E- Commerce and IT Security for the University of Phoenix Online and DeVRy University Online. He completed his MS in Decision and Information Systems from State University. He also hold a Master’s of Education degree from ASU.
Jim Breithaupt is the co-author of this book. Other books written by him are Security Assurance Through the Common Criteria, Computer Security Assurance, and The E-Privacy Imperative. Jim works as a Project Manager in Phoenix. He has over 20 years of experience in the IT field. He serves in the Financial Services industry.
I