Menu Expand
Information Security Management Principles

Information Security Management Principles

Andy Taylor | David Alexander | Amanda Finch | David Sutton | Andy Taylor

(2013)

Abstract

In today’s technology-driven environment, there is an ever-increasing demand for information delivery. A compromise has to be struck between security and availability. This book is a pragmatic guide to information assurance for both business professionals and technical experts. The second edition includes the security of cloud-based resources and the contents have been revised to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.
The security of personal information must keep pace with technology in order to provide a safe and secure environment. This 2nd edition provides a timely update to ensure that BCS remains as an important leader in the education of information security principles.
David Smith
Commercial, personal and sensitive information is very hard to keep secure, and technological solutions are not the only answer. In today’s technology-driven environment, there is an ever-increasing demand for information delivery on various devices in the office, at home and in public places. A compromise has to be struck between security of information and its availability. This book provides significant first steps along the path of dealing with information assurance in a realistic and comprehensive manner. The second edition has been expanded to include the security of cloud-based resources. The remainder of the contents have been reviewed and reordered to reflect the changes to the BCS Certification in Information Security Management Principles which the book supports.
The authors are at the forefront of information security and are instrumental in shaping policy and implementing best-practice. They have gained considerable experience across a wide range of public and private sector bodies including the Home Office, GCHQ, MoD, RAF, Royal Navy, British Airways, Marks & Spencer and O2.
If you want an excellent introduction to information security you could do worse than buying a copy of this book. Highly recommended.
John Hughes

Table of Contents

Section Title Page Action Price
Cover Cover
Copyright iv
CONTENTS v
LIST OF FIGURES AND TABLES vii
AUTHORS viii
ACKNOWLEDGEMENTS x
ABBREVIATIONS xi
PREFACE xiv
1 INFORMATION SECURITY PRINCIPLES 1
CONCEPTS AND DEFINITIONS 1
THE NEED FOR, AND BENEFITS OF, INFORMATION SECURITY 9
POINTERS FOR ACTIVITIES IN THIS CHAPTER 16
2 INFORMATION RISK 19
THREATS TO, AND VULNERABILITIES OF, INFORMATION SYSTEMS 19
RISK MANAGEMENT 24
POINTERS FOR ACTIVITIES IN THIS CHAPTER 34
3 INFORMATION SECURITY FRAMEWORK 37
ORGANISATIONS AND RESPONSIBILITIES 37
ORGANISATIONAL POLICY, STANDARDS AND PROCEDURES 44
INFORMATION SECURITY GOVERNANCE 49
INFORMATION SECURITY IMPLEMENTATION 54
SECURITY INCIDENT MANAGEMENT 59
LEGAL FRAMEWORK 62
SECURITY STANDARDS AND PROCEDURES 73
POINTERS FOR ACTIVITIES IN THIS CHAPTER 81
4 PROCEDURAL AND PEOPLE SECURITY CONTROLS 85
PEOPLE 85
USER ACCESS CONTROLS 90
TRAINING AND AWARENESS 99
POINTERS FOR ACTIVITIES IN THIS CHAPTER 105
5 TECHNICAL SECURITY CONTROLS 108
PROTECTION FROM MALICIOUS SOFTWARE 108
NETWORKS AND COMMUNICATIONS 114
EXTERNAL SERVICES 122
CLOUD COMPUTING 126
IT INFRASTRUCTURE 131
POINTERS FOR ACTIVITIES IN THIS CHAPTER 137
6 SOFTWARE DEVELOPMENT AND LIFE CYCLE 141
TESTING, AUDIT AND REVIEW 141
SYSTEMS DEVELOPMENT AND SUPPORT 143
POINTERS FOR ACTIVITIES IN THIS CHAPTER 151
7 PHYSICAL AND ENVIRONMENTAL SECURITY 154
LEARNING OUTCOMES 154
GENERAL CONTROLS 154
PHYSICAL SECURITY 154
TECHNICAL SECURITY 155
PROCEDURAL SECURITY 156
PROTECTION OF EQUIPMENT 157
PROCESSES TO HANDLE INTRUDER ALERTS 158
CLEAR SCREEN AND DESK POLICY 160
MOVING PROPERTY ON AND OFF SITE 161
PROCEDURES FOR SECURE DISPOSAL 163
SECURITY REQUIREMENTS IN DELIVERY AND LOADING AREAS 164
POINTERS FOR ACTIVITIES IN THIS CHAPTER 164
8 DISASTER RECOVERY AND BUSINESS CONTINUITY MANAGEMENT 166
LEARNING OUTCOMES 166
DR/BCP, RISK ASSESSMENT AND IMPACT ANALYSIS 166
WRITING AND IMPLEMENTING PLANS 168
DOCUMENTATION, MAINTENANCE AND TESTING 169
LINKS TO MANAGED SERVICE PROVISION AND OUTSOURCING 171
SECURE OFF-SITE STORAGE OF VITAL MATERIAL 172
INVOLVEMENT OF PERSONNEL, SUPPLIERS AND IT SYSTEMS PROVIDERS 173
SECURITY INCIDENT MANAGEMENT 174
COMPLIANCE WITH STANDARDS 175
POINTERS FOR THE ACTIVITY IN THIS CHAPTER 175
9 OTHER TECHNICAL ASPECTS 176
INVESTIGATIONS AND FORENSICS 176
ROLE OF CRYPTOGRAPHY 179
POINTERS FOR THE ACTIVITY IN THIS CHAPTER 188
APPENDIX A 191
GLOSSARY 196
INDEX 203
Back Cover 209