Information Security Management Handbook, 6th ed.最新文献

筛选
英文 中文
Building an Effective and Winning 建立一个有效的和成功的
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch49
Lynda L. McGhie
{"title":"Building an Effective and Winning","authors":"Lynda L. McGhie","doi":"10.1201/9781439833032.ch49","DOIUrl":"https://doi.org/10.1201/9781439833032.ch49","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123633881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring ROI on Security 衡量安全方面的投资回报率
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch12
Carl F. Endorf
{"title":"Measuring ROI on Security","authors":"Carl F. Endorf","doi":"10.1201/9781439833032.ch12","DOIUrl":"https://doi.org/10.1201/9781439833032.ch12","url":null,"abstract":"Carl F. Endorf 12.1 Understanding ROI 133 12.2 Asset Identification and Valuation 134 12.3 Threat and Vulnerability Exposure Factor 134 12.4 Determine the Single Loss Expectancy 135 12.5 Annualized Rate of Occurrence 135 12.6 Annual Loss Expectancy 135 12.7 Survey Controls 135 12.8 Calculate Your ROSI 135 ROSI Example † Arguments against ROSI","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123532366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hacker Attacks and Defenses 黑客攻击与防御
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch74
Ed Skoudis
{"title":"Hacker Attacks and Defenses","authors":"Ed Skoudis","doi":"10.1201/9781439833032.ch74","DOIUrl":"https://doi.org/10.1201/9781439833032.ch74","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131754272","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ownership and Custody of Data 数据的所有权和保管
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch20
W. Murray
{"title":"Ownership and Custody of Data","authors":"W. Murray","doi":"10.1201/9781439833032.ch20","DOIUrl":"https://doi.org/10.1201/9781439833032.ch20","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Enterprise Security Management Program 企业安全管理方案
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch23
George G. McBride
{"title":"Enterprise Security Management Program","authors":"George G. McBride","doi":"10.1201/9781439833032.ch23","DOIUrl":"https://doi.org/10.1201/9781439833032.ch23","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"42 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120921364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Common System Design Flaws and Security Issues 常见的系统设计缺陷和安全问题
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch112
W. Murray
{"title":"Common System Design Flaws and Security Issues","authors":"W. Murray","doi":"10.1201/9781439833032.ch112","DOIUrl":"https://doi.org/10.1201/9781439833032.ch112","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129885215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Guide to Evaluating Tokens 评估令牌的指南
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch63
J. Hootman
{"title":"A Guide to Evaluating Tokens","authors":"J. Hootman","doi":"10.1201/9781439833032.ch63","DOIUrl":"https://doi.org/10.1201/9781439833032.ch63","url":null,"abstract":"Fixed passwords are no longer appropriate for controlling computer access. Effective access control calls for the use of dynamic passwords, which are generated by tokens, a calculator-type device. Many such devices have now been introduced into the marketplace, but no one is necessarily appropriate for all situations. This article discusses the use of dynamic passwords and describes the characteristics of currently available password generators and their advantages and disadvantages in particular situations. A chart comparing the features of a selected group of tokens is included.","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"162 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133895209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Role of Information Security in the Enterprise Risk Management Structure 信息安全在企业风险管理结构中的作用
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch25
C. Jackson, M. Carey
{"title":"The Role of Information Security in the Enterprise Risk Management Structure","authors":"C. Jackson, M. Carey","doi":"10.1201/9781439833032.ch25","DOIUrl":"https://doi.org/10.1201/9781439833032.ch25","url":null,"abstract":"The purpose of this chapter is to discuss the role of information security business processes in supporting an enterprise view of risk management and to highlight how, working in harmony, the ERM and information security organizational components can provide measurable value to the enterprise people, technologies, processes, and mission. This chapter also briefly focuses on additional continuity process improvement techniques. If not already considered a part of the organization’s overall enterprise risk management (ERM) program, why should business information security professionals seriously pursue aligning their information security programs with ERM initiatives?","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131028884","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Enhancing Security through Biometric Technology 利用生物识别技术加强保安
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch68
S. Fried
{"title":"Enhancing Security through Biometric Technology","authors":"S. Fried","doi":"10.1201/9781439833032.ch68","DOIUrl":"https://doi.org/10.1201/9781439833032.ch68","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133711780","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Committee of Sponsoring Organizations (COSO) 赞助机构委员会(COSO)
Information Security Management Handbook, 6th ed. Pub Date : 1900-01-01 DOI: 10.1201/9781439833032.ch31
M. Cote
{"title":"Committee of Sponsoring Organizations (COSO)","authors":"M. Cote","doi":"10.1201/9781439833032.ch31","DOIUrl":"https://doi.org/10.1201/9781439833032.ch31","url":null,"abstract":"","PeriodicalId":407371,"journal":{"name":"Information Security Management Handbook, 6th ed.","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129439943","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 73
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信