Defending the Digital Frontier
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Book 1
Book 2
Book 3
Home > Business and Economics > Business and Management > Business strategy > Defending the Digital Frontier: A Security Agenda
Defending the Digital Frontier: A Security Agenda

Defending the Digital Frontier: A Security Agenda


     0     
5
4
3
2
1



Out of Stock


Notify me when this book is in stock
X
About the Book

Table of Contents:
List of Figures and Tables. Foreword. Preface. Acknowledgments. PART ONE: THE CHALLENGE OF THE FRONTIER. Chapter 1: The Security Frontier. Identifying the Security Frontier. Environment. Responsibilities. Priorities. Challenges at the Frontier. Threats and Vulnerabilities. An Attack Scenario. Chapter 2: Security Characteristics. Aligned. Enterprise-Wide. Continuous. Proactive. Validated. Formal. Chapter 3: Organizational Components and Security Objectives. Organizational Components. People. Process. Technology. Security Objectives. Confidentiality, Integrity, and Availability. Access Control. PART TWO: THE AGENDA FOR ACTION. Chapter 4: The Security Agenda. Restrict, Run, and Recover(SM). Security Agenda Items. Planning, Architecture, Operations, and Monitoring Capabilities. Organizational Model. Capabilities. Chapter 5: The Three Rs of Digital Security. Restrict. Intrusion and Virus Detection. Incident Response. Privacy. Policies, Standards, and Guidelines. Physical Security. Run. Asset and Service Management. Vulnerability Management. Entitlement Management. Recover. Business Continuity Planning. PART THREE: THE APPROACH FOR SAFETY. Chapter 6: The Security Culture. The Chief Executive as an Agent of Change. Instill a Heightened Sense of Awareness. Build a Digital Security Guidance Council. Establish a Time Table and Monitor Progress. Roll Out an Enterprise-Wide Security Awareness and Training Program. Chapter 7: The Risk Frontier. Modeling and Defining Digital Security Risk. Low and Slow Scenario: Lessons to Be Learned. High-Impact Risk Scenario: Lessons to Be Learned. Containment and Control Scenarios: Lessons to Be Learned. Approaching Risk Management. Chapter 8: Road Map for Success. Positioning the Organization within the Industry. Resource Allocation. Insuring against Digital Security Events. Table-Top Exercises. The Orbit of Regard. Appendix A: Security-Related Laws and Regulations. U.S. Laws. The USA Patriot Act of 2001. The Digital Privacy Act of 2000. The Electronic Communications Privacy Act of 1986, 2000. The Gramm Leach Bliley (GLB) Act of 1999 (Financial Services Modernization Act). The Electronic Freedom of Information Act of 1996 161 The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996. The National Information Infrastructure Protection Act of 1996. The Computer Security Act of 1987. The Computer Fraud and Abuse Act of 1986. The Computer Crime Control Act of 1984. U.S. Federal Privacy Act of 1974. U.S. Regulations, Agencies, and Guidelines. The National Infrastructure Assurance Council (NIAC, 1999). Federal Guidelines for Searching and Seizing Computers (U.S. Dept. of Justice, 2001). International Laws, Regulations, and Guidelines Related to Digital Security and Privacy. Australia. European Union. India. Japan. Malaysia. Mauritius. Philippines. Poland. United Kingdom. Appendix B: Threat Vectors. 2002 Top 10 Digital Security Threat Vectors. Appendix C: Ernst & Young 2002 Digital Security Overview: An Executive Guide and Diagnostic. Endnotes. Glossary of Digital Security Terminology. Index.

About the Author :
ERNST & YOUNG is one of the nation’s leading professional services firms, providing tax, assurance, and advisory business services to thousands of individuals as well as domestic and global businesses. MARK W. DOLL is a Partner and the Americas Director of Ernst & Young’s Security Services. As the Americas Director, Mark is responsible overall for security projects, including security assessments, architecture design, and security implementation as well as business continuity. Mr. Doll is a sought-after speaker on the topic of digital security, and has recently appeared before the House Energy and Commerce Subcommittee on Commerce, Trade, and Consumer Protection as an expert witness on the subject. SAJAY RAI is a Partner in Ernst & Young’s Security Services. He is a Certified Information Systems Security Professional (CISSP) and is a frequent speaker on the topics of security and business continuity. He serves on the advisory board of several organizations. JOSE GRANADO is a Partner in Ernst & Young’s Security Services, and Director of the Advanced Security Center focused on attack and penetration services. He is a Certified Information Systems Security Professional (CISSP).


Best Sellers


Product Details
  • ISBN-13: 9780470238295
  • Publisher: John Wiley & Sons Inc
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • Sub Title: A Security Agenda
  • ISBN-10: 0470238291
  • Publisher Date: 23 Jul 2007
  • Binding: Digital (delivered electronically)
  • No of Pages: 280


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Defending the Digital Frontier: A Security Agenda
John Wiley & Sons Inc -
Defending the Digital Frontier: A Security Agenda
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Defending the Digital Frontier: A Security Agenda

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    Fresh on the Shelf


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!