Defending the Digital Frontier (eBook)
238 Seiten
Wiley (Verlag)
978-0-471-46630-7 (ISBN)
ERNST & YOUNG is one of the nation's leading professional services firms, providing tax, assurance, and advisory business services to thousands of individuals as well as domestic and global businesses. MARK W. DOLL is a Partner and the Americas Director of Ernst & Young's Security Services. As the Americas Director, Mark is responsible overall for security projects, including security assessments, architecture design, and security implementation as well as business continuity. Mr. Doll is a sought-after speaker on the topic of digital security, and has recently appeared before the House Energy and Commerce Subcommittee on Commerce, Trade, and Consumer Protection as an expert witness on the subject. SAJAY RAI is a Partner in Ernst & Young's Security Services. He is a Certified Information Systems Security Professional (CISSP) and is a frequent speaker on the topics of security and business continuity. He serves on the advisory board of several organizations. JOSE GRANADO is a Partner in Ernst & Young's Security Services, and Director of the Advanced Security Center focused on attack and penetration services. He is a Certified Information Systems Security Professional (CISSP).
List of Figures and Tables.
Foreword.
Preface.
Acknowledgments.
PART ONE: THE CHALLENGE OF THE FRONTIER.
Chapter 1: The Security Frontier.
Identifying the Security Frontier.
Environment.
Responsibilities.
Priorities.
Challenges at the Frontier.
Threats and Vulnerabilities.
An Attack Scenario.
Chapter 2: Security Characteristics.
Aligned.
Enterprise-Wide.
Continuous.
Proactive.
Validated.
Formal.
Chapter 3: Organizational Components and Security Objectives.
Organizational Components.
People.
Process.
Technology.
Security Objectives.
Confidentiality, Integrity, and Availability.
Access Control.
PART TWO: THE AGENDA FOR ACTION.
Chapter 4: The Security Agenda.
Restrict, Run, and Recover(SM).
Security Agenda Items.
Planning, Architecture, Operations, and Monitoring Capabilities.
Organizational Model.
Capabilities.
Chapter 5: The Three Rs of Digital Security.
Restrict.
Intrusion and Virus Detection.
Incident Response.
Privacy.
Policies, Standards, and Guidelines.
Physical Security.
Run.
Asset and Service Management.
Vulnerability Management.
Entitlement Management.
Recover.
Business Continuity Planning.
PART THREE: THE APPROACH FOR SAFETY.
Chapter 6: The Security Culture.
The Chief Executive as an Agent of Change.
Instill a Heightened Sense of Awareness.
Build a Digital Security Guidance Council.
Establish a Time Table and Monitor Progress.
Roll Out an Enterprise-Wide Security Awareness and Training Program.
Chapter 7: The Risk Frontier.
Modeling and Defining Digital Security Risk.
Low and Slow Scenario: Lessons to Be Learned.
High-Impact Risk Scenario: Lessons to Be Learned.
Containment and Control Scenarios: Lessons to Be Learned.
Approaching Risk Management.
Chapter 8: Road Map for Success.
Positioning the Organization within the Industry.
Resource Allocation.
Insuring against Digital Security Events.
Table-Top Exercises.
The Orbit of Regard.
Appendix A: Security-Related Laws and Regulations.
U.S. Laws.
The USA Patriot Act of 2001.
The Digital Privacy Act of 2000.
The Electronic Communications Privacy Act of 1986, 2000.
The Gramm Leach Bliley (GLB) Act of 1999 (Financial Services Modernization Act).
The Electronic Freedom of Information Act of 1996 161 The Healthcare Insurance Portability and Accountability Act (HIPAA) of 1996.
The National Information Infrastructure Protection Act of 1996.
The Computer Security Act of 1987.
The Computer Fraud and Abuse Act of 1986.
The Computer Crime Control Act of 1984.
U.S. Federal Privacy Act of 1974.
U.S. Regulations, Agencies, and Guidelines.
The National Infrastructure Assurance Council (NIAC, 1999).
Federal Guidelines for Searching and Seizing Computers (U.S. Dept. of Justice, 2001).
International Laws, Regulations, and Guidelines Related to Digital Security and Privacy.
Australia.
European Union.
India.
Japan.
Malaysia.
Mauritius.
Philippines.
Poland.
United Kingdom.
Appendix B: Threat Vectors.
2002 Top 10 Digital Security Threat Vectors.
Appendix C: Ernst & Young 2002 Digital Security Overview: An Executive Guide and Diagnostic.
Endnotes.
Glossary of Digital Security Terminology.
Index.
Erscheint lt. Verlag | 7.4.2003 |
---|---|
Sprache | englisch |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
Schlagworte | Business & Management • Business Technology • Computersicherheit • Informationstechnik • Unternehmenstechnologie • Wirtschaft u. Management |
ISBN-10 | 0-471-46630-1 / 0471466301 |
ISBN-13 | 978-0-471-46630-7 / 9780471466307 |
Haben Sie eine Frage zum Produkt? |
Größe: 2,4 MB
Kopierschutz: Adobe-DRM
Adobe-DRM ist ein Kopierschutz, der das eBook vor Mißbrauch schützen soll. Dabei wird das eBook bereits beim Download auf Ihre persönliche Adobe-ID autorisiert. Lesen können Sie das eBook dann nur auf den Geräten, welche ebenfalls auf Ihre Adobe-ID registriert sind.
Details zum Adobe-DRM
Dateiformat: PDF (Portable Document Format)
Mit einem festen Seitenlayout eignet sich die PDF besonders für Fachbücher mit Spalten, Tabellen und Abbildungen. Eine PDF kann auf fast allen Geräten angezeigt werden, ist aber für kleine Displays (Smartphone, eReader) nur eingeschränkt geeignet.
Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen eine
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen eine
Geräteliste und zusätzliche Hinweise
Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.
aus dem Bereich