Description |
xi, 324 pages ; 25 cm |
Contents |
Foreword / Nigel Turnbull -- Introduction / Background -- 1. Why is information security necessary? -- 2. The Combined Code and the Turnbull Report -- 3. BS 7799 -- 4. Information security management -- 5. Information security policy and scope -- 6. The risk assessment and statement of applicability -- 7. Security of third party access and outsourcing -- 8. Asset classification and control -- 9. Personnel security -- 10. Physical and environmental security -- 11. Equipment security -- 12. General security controls -- 13. Communications and operations management -- 14. Controls against malicious software (malware) -- 15. Housekeeping, network management and media handling -- 16. Exchanges of information and software -- 17. E-mail and Internet use -- 18. Access control -- 19. Network access control -- 20. Operating system access control -- 21. Application access control -- 22. Mobile computing and teleworking -- 23. Systems development and maintenance |
|
24. Cryptographic controls -- 25. Security in development and support processes -- 26. Business continuity management -- 27. Compliance -- 28. The BS 7799 audit |
Bibliography |
Includes bibliographical references and index |
Subject |
Data protection.
|
|
Business enterprises -- Computer networks -- Security measures.
|
|
Business enterprises -- Computer networks -- Security measures -- Standards.
|
Author |
Watkins, Steve, 1970-
|
LC no. |
2002483754 |
ISBN |
0749438452 : |
|