Nelson Higher Education

Higher Education

Roadmap to Information Security: For IT and Infosec Managers, 1st Edition

  • Michael E. Whitman
  • Herbert J. Mattord
  • ISBN-10: 1435480309
  • ISBN-13: 9781435480308
  • 400 Pages | Paperback
  • COPYRIGHT: 2011 Published
Request a Copy for Review

Overview

About the Product

ROADMAP TO INFORMATION SECURITY: FOR IT AND INFOSEC MANAGERS provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on assessing and improving an organization's security. The content helps IT managers to handle an assignment to an information security role in ways that conform to expectations and requirements, while supporting the goals of the manager in building and maintaining a solid information security program.

Features

  • THE INFORMATION SECURITY MANAGER'S JOURNAL: Each chapter opens with an ongoing narrative written in the first person, providing insight into the challenges information systems professionals face when placed into the role of an information security manager.

  • REFLECTION POINTS: Journal entries conclude with a set of open-ended questions that complete the scenario and give the reader a chance to further ponder the issues under discussion.

  • TECHNICAL AND MANAGERIAL DETAILS BOXES: Interspersed throughout the book, these sections highlight interesting topics and detailed technical issues, giving the reader the option of delving into selected topics more deeply.

  • HANDS-ON ASSESSMENT CHECKLISTS: Program assessment questions offer users the opportunity to compare their programs against national and international information security standards, such as ISO 27001 and NIST SP 800 series.

  • SECURITY PROFESSIONAL CERTIFICATION MAP: A map of the CISSP and CISM certification domains into the chapters and sections of the book will facilitate review and study for those seeking certification.

  • INCLUDES FOREWORD WRITTEN BY RESPECTED INDUSTRY PIONEER DONN B. PARKER

About the Author

Michael E. Whitman

Michael Whitman, Ph.D., CISM, CISSP, is the executive director of the Institute for Cybersecurity Workforce Development and a professor of information security at Kennesaw State University. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded K.S.U.’s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the editor-in-chief of the Journal of Cybersecurity Education and Research and Practice, and he is director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in information security policy, threats, curriculum development and ethical computing. He currently teaches graduate and undergraduate courses in information security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; THE GUIDE TO NETWORK SECURITY and THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an armored cavalry officer with additional duties as the automated data processing system security officer (ADPSSO).

Herbert J. Mattord

Herbert Mattord, Ph.D., CISM, CISSP, completed 24 years of IT industry experience as an application developer, database administrator, project manager and information security practitioner before joining the faculty at Kennesaw State University, where he is a professor of information security and assurance. Dr. Mattord currently teaches graduate and undergraduate courses in information security and assurance as well as information systems. He is also a senior editor of the Journal of Cybersecurity Education, Research and Practice. He and Dr. Michael Whitman have authored PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY, PRINCIPLES OF INFORMATION SECURITY, MANAGEMENT OF INFORMATION SECURITY, READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, THE GUIDE TO NETWORK SECURITY and THE HANDS-ON INFORMATION SECURITY LAB MANUAL. Dr. Mattord is an active researcher, author and consultant in information security management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University, Austin Community College and Texas State University: San Marcos. He was formerly the manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks.

Table of Contents

Part I: OVERVIEW OF THE SECURITY LANDSCAPE.
1. Introduction to the Roadmap to Information Security Roadmap.
2. Threats to Information Assets.
3. Attacks on Information Assets.
Part II: STRATEGIC INFORMATION SECURITY: SECURITY GOVERNANCE.
4. Information Technology and Information Security Governance.
5. Information Security Roles and Responsibilities.
6. Positioning the Information Security Function.
7. Conducting an Information Security Assessment.
Part III: STRATEGIC INFORMATION SECURITY: RISK MANAGEMENT.
8. Risk Management: Risk Identification.
9. Risk Management: Risk Assessment.
10. Risk Management: Risk Control.
11. Alternate Approaches to Risk Management.
PART IV: STRATEGIC INFORMATION SECURITY: STANDARDS, REGULATIONS, LAW AND ETHICS.
12. Standards for Managing the Information Security Program.
13. Emerging Trends in Certification and Accreditation.
14. Dealing with Regulatory Compliance and Key Legal Issues.
15. Other Important Laws for Every IT/Security Manager.
16. Ethics in IT and Information Security.
Part V: TACTICAL INFORMATION SECURITY: POLICIES AND PROGRAMS.
17. Information Security Policy: Development and Implementation.
18. Information Security Policy Types: EISP, ISSP, SysSP.
19. Employment Policies and Practices.
20. Implementing Security Education, Training, and Awareness Programs.
Part VI: TACTICAL INFORMATION SECURITY: CONTINGENCY PLANNING.
21. Contingency Planning: Planning for the Worst.
22. The Incident Response Plan.
23. The Disaster Recovery Plan.
24. The Business Continuity Plan.
Part VII: OPERATIONAL INFORMATION SECURITY: NETWORK SECURITY.
25. Communications and Operations Management.
26. Firewalls.
27. Protecting Remote Access.
28. Intrusion Detection Systems.
29. Scanning and Analysis Tools.
Part VIII: OPERATIONAL INFORMATION SECURITY: CRYPTOGRAPHY AND ACCESS CONTROLS.
30. Cryptography in Theory.
31. Cryptography in Practice.
32. Access Controls and Biometrics.
33. Physical Security.
Part IX: SUPPLEMENTAL MATERIALS.
Appendix A: Information Security Self-Assessment Checklists.
Appendix B: Information Security Certification Guidelines – The CISSP/SSCP.
Appendix C: Information Security Certification Guidelines – The CISM.