Security Fundamentals

Security Fundamentals

List price: US$119.99

Currently unavailable

Add to wishlist

AbeBooks may have this title (opens in new window).

Try AbeBooks

Description

For courses in Networking Security.



This introduction to information security is a combination of a printed text, a lab experience, and an online web-based curriculum that can be delivered to the student anytime and anywhere there is an internet connection. It provides the user with a robust learning experience-the student is provided with ample resource information in the text as well as from the online course. The online course includes hundreds of FLASH animations and graphics that allow the student a level of engagement not possible with a pure text solution.



As the demand on the internet for business and home use grows, it is imperative that the information coming in and going out be secure. Identity theft, corporate information theft, and personal account theft are ever looming. Information security is, right now, the most important area of networking. Security Fundamentals will teach the reader what to look for and how to protect their business as well as their personal information from theft.
show more

Product details

  • Hardback | 576 pages
  • 191 x 235mm
  • Prentice Hall Certification
  • Upper Saddle River, United States
  • English
  • 0131173286
  • 9780131173286

Table of contents

PART ONE: INTRODUCTION TO INFORMATION SECURITY.

1. Overview of Information Security.

2. Security Objectives and Mission.

3. Information Security Organizational Structure.

4.Guidance, Resources and Standards.



PART TWO: SECURITY PROCESSES AND RISK.

5. Security Process.

6. Information Security Risk Assessment.

7. Understanding Risk and Control Relationship.

8. Information Security Strategy.



PART THREE: SECURITY CONTROLS IMPLEMENTATION.

9. Authentication and Access Control.

10. Authentication.

11. Remote Access.

12.Physical Security.



PART FOUR: NETWORK ATTACKS AND REMEDIES.

13. Malicious Codes and Preventions.

14. Intrusion Detection.

15. Encryption.

16.Security Devices.



PART FIVE: BUSINESS ISSUES AND INFORMATION SECURITY.

17. Defining security requirements.

18. Business Continuity Considerations.

19. Monitoring and Updating.

20. End User Training and Security Awareness.

21. Legal Aspects of Networking Security.

22. Potential Case Study.



INDEX.
show more