Security Controls for Sarbanes-Oxley Section 404 IT Compliance - Dennis C. Brewer

Security Controls for Sarbanes-Oxley Section 404 IT Compliance

Authorization, Authentication, and Access
Buch | Softcover
262 Seiten
2005
Hungry Minds Inc,U.S. (Verlag)
978-0-7645-9838-8 (ISBN)
46,55 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Offers a look at why a network must be set up with certain authentication computer science protocols that guarantee security. This work addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta-directories, identity provisioning, authentication, and access control.
The Sarbanes-Oxley Act requires public companies to implement internal controls over financial reporting, operations, and assets - all of which depend heavily on installing or improving information security technology. This work offers an in-depth look at why a network must be set up with certain authentication computer science protocols (rules for computers to talk to one another) that guarantee security. It addresses the critical concepts and skills necessary to design and create a system that integrates identity management, meta-directories, identity provisioning, authentication, and access control. This work is a companion book to "Manager's Guide to the Sarbanes-Oxley Act" (0-471-56975-5) and "How to Comply with Sarbanes-Oxley Section 404" (0-471-65366-7).

Dennis C. Brewer is IT Security Solutions Specialist for the Information Technology Department of the State of Michigan. His responsibilities include identity management and privacy protection initiatives for the state.

About the Author.Acknowledgments.Introduction.Chapter 1: The Role of Information Technology Architecture in Information Systems Design.Chapter 2: Understanding Basic Concepts of Privacy and Data Protection.Chapter 3: Defining and Enforcing Architecture.Chapter 4: Combining External Forces, Internal Influences, and IT Assets.Chapter 5: Simplifying the Security Matrix.Chapter 6: Developing Directory-Based Access Control Strategies.Chapter 7: Integrating the Critical Elements.Chapter 8: Engineering Privacy Protection into Systems and Applications.Chapter 9: The Value of Data Inventory and Data Labeling.Chapter 10: Putting It All Together in the Web Applications Environment.Chapter 11: Why Federated Identity Schemes Fail.Chapter 12: A Pathway to Universal Two-Factor Authentication.Appendix A: WWW Resources for Authentication, Authorization, and Access Control News and Information.Appendix B: Important Access Control and Security Terms.Appendix C: Critical Success Factors for Controls Design.Appendix D: Sample Policy Statements for Compulsory Access and Security Controls.Appendix E: Documentation Examples.Appendix F: Sample Job Description for Directory Engineer/Schema Architect.Index.

Erscheint lt. Verlag 25.10.2005
Zusatzinfo Illustrations
Verlagsort Foster City
Sprache englisch
Maße 189 x 234 mm
Gewicht 448 g
Einbandart Paperback
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Wirtschaft Betriebswirtschaft / Management Unternehmensführung / Management
ISBN-10 0-7645-9838-4 / 0764598384
ISBN-13 978-0-7645-9838-8 / 9780764598388
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Das Lehrbuch für Konzepte, Prinzipien, Mechanismen, Architekturen und …

von Norbert Pohlmann

Buch | Softcover (2022)
Springer Vieweg (Verlag)
34,99
Management der Informationssicherheit und Vorbereitung auf die …

von Michael Brenner; Nils gentschen Felde; Wolfgang Hommel

Buch (2024)
Carl Hanser (Verlag)
69,99

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00