Risks, controls, and security concepts and applications
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[Chichester]
Wiley
2007
|
Ausgabe: | 1. ed. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV020040666 | ||
003 | DE-604 | ||
005 | 20070412 | ||
007 | t| | ||
008 | 050922s2007 xx ad|| |||| 00||| eng d | ||
020 | |a 0471485799 |9 0-471-48579-9 | ||
020 | |a 9780471485797 |9 978-0-471-48579-7 | ||
035 | |a (OCoLC)85766845 | ||
035 | |a (DE-599)BVBBV020040666 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-1051 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Raval, Vasant |e Verfasser |4 aut | |
245 | 1 | 0 | |a Risks, controls, and security |b concepts and applications |c Raval Vasant ; Ashok Fichadia |
250 | |a 1. ed. | ||
264 | 1 | |a [Chichester] |b Wiley |c 2007 | |
300 | |a XXII, 403 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Risikomanagement |0 (DE-588)4121590-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Risikomanagement |0 (DE-588)4121590-4 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |C b |5 DE-604 | |
700 | 1 | |a Fichadia, Ashok |e Verfasser |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361756&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Regensburg |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361756&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-013361756 |
Datensatz im Suchindex
_version_ | 1819714861899186176 |
---|---|
adam_text | Contents
Preface
►CHAPTER
Enterprise Risk Management
Security in practice
Learning objectives
Concept maps
Introduction
Enterprise risk management
Business environment risk
Business strategy risk
Business process risk
Business outcomes risk
Business and information systems
Organization structure
Business processes
Information systems
Business processes and information systems
Information systems assurance
Assurance and risk management
An information systems assurance approach
Management s role in information systems
assurance
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Information Systems Concerns and Risks
Security in practice
Learning objectives
Introduction
Target system
Target system boundary (perimeter)
Target system communication
Target system location and spread
Target system control and security
Risk
Risk exposures
Factors causing changes in risk
Risk management
Security, functionality, and usability
Risk management and change
Control systems
Components of control systems
Designing effective control systems
Logical constructs of control systems
Security in practice
Common criteria
Implications for assurance
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Control and Security Frameworks
Security in practice
Learning objectives
Introduction
Protecting information assets
Need for protecting information assets
Vulnerabilities and threats
Internal control and information security
Definition of internal control
Classification of internal controls
Definition of information security
Classification of information security measures
Relationship between internal control and information
security
Internal control and information security objectives
Internal control objectives
Information security objectives
Comparison of internal control and security
objectives
Relationship between internal control and security
objectives
Frameworks for control and security
COBIT
ISO
COSO
A comparison of frameworks
Implementing a framework
ix
Contents
Assurance
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►APPENDIX
A Summary of Section
►APPENDIX
Aksarben Furniture Mart (AFM)
►CHAPTER
Systems Availability and Business Continuity
Security in practice
Learning objectives
Introduction
Systems availability and business continuity
Systems availability
Incident response
Incidents
Incident response team
Nature of response
Preventive measures
Disaster recovery
Postdisaster phases
Disaster recovery planning
Components of planning
Assessing potential losses: disaster impact
analysis
Value-based recovery planning
Finding criticality
Disaster recovery strategies
Recovery locations
Disaster recovery teams
Disaster readiness
Business continuity planning 111
Business impact analysis 111
Business recovery
Assurance considerations
Method
Content
Live testing
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Basic Cryptography
Security in practice
Learning objectives
Introduction
Basic concepts
Meaning of cryptography
Purposes of cryptography
Terms and definitions
Process components
Method and key
Using cryptography
Secret key cryptography
Basic approaches
Method and key in secret key cryptography
Cryptographic algorithms
Advantages and limitations of secret key
cryptography
Cryptanalysis of secret key cryptography
Current secret key algorithms
Message digests
Message digest methods
Role in cryptography
Public key cryptography
Basic approach
Method and key in PKC
Current public key algorithms
Advantages and limitations of public key
cryptography
Cryptanalysis of PKC
Implications for assurance
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Public Key Cryptography: Concepts and
Applications
Security in practice
Learning objectives
Introduction
Distribution of secret keys
Key distribution
Key agreement
Digital signature
Trust in public keys
Need for trust
Contents <] xi
Trust
Sources and levels of trust
Meeting requirements of trust
Digital (public key) certificate
Certification authority
Trust levels in digital certificates
Web trust models
Public key infrastructure
Infrastructure
Nature and characteristics
X.5O9
PKI applications
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Operating Systems Security
Security in practice
Learning objectives
Introduction
Operating systems primer
Goals of operating systems
Management concerns
Common operating systems
Common risks and controls
Authentication
Authorization
Trust relationships
Job scheduling
File systems
Software updates
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Application Security
Security in practice
Learning objectives
Introduction
Applications primer
Application architecture
Advantages of application tiers
Management concerns
Common risks and controls
Boundary checking
Input manipulation
Application authentication
Session management
Change control and change management
Application infrastructure
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Database Management Systems Security
Security in practice
Learning objectives
Introduction
Database management systems primer
Need for databases
Types of databases
Management concerns
Common risks and controls
Authentication
Trust relationships
Networking within databases and with operating
systems
Insecure design of database applications
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Telecommunications Security
Security in practice
Learning objectives
Introduction
Telecommunications primer
Public switched telephone network
(PSTN)
A closer look at PSTN
Voice over IP networks
The promise of VoIP networks
Management concerns
xii £> Contents
Common risks and controls
Direct inward system access
Maintenance ports
Silent monitoring
Telecom scams
Voice mail and conferencing systems
VoIP security
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Network Security
Security in practice
Learning objectives
Introduction
Network primer
OSI
TCP/IP
TCP/IP protocols
IP addresses
Ports
Protocols, IP addresses, ports
does it all fit?
Goals of networks
Management concerns
Common risks and controls
Clear-text transmissions
Modems
Virtual private networks
Firewalls
Wireless networks
Denial of service attacks
Simple network management protocol
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Web Security
Security in practice
Learning objectives
Introduction
Web primer
Web client
Transport mechanisms
Web server
Static and dynamic content
Databases
Management concerns
Common risks and controls
Web browsers
Web servers
Web applications
Assurance considerations
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
►CHAPTER
Policy, Regulation, and Ethics
Security in practice
Learning objectives
Introduction
Policy, regulation, and ethics
Organization and accountability
Security policies
Characteristics of a policy
Classification of policies
Policy development process
Regulatory requirements
Information assets protection
Ethical behavior in organizations
Frameworks for ethical behavior
Business ethics
Ethics and information technology
Social engineering
Threats
Countermeasures
Assurance considerations
Security policy development, implementation, and
enforcement
Compliance with regulations
Ethical behavior
Summary
Key words
Multiple-choice questions
Discussion questions
Exercises
Glossary
Index
L
In today s networked world, security and risk control are no
longer just the province of the IT department. Accountants
and other business managers who are responsible for corpo¬
rate risk management must fully understand the control and
security risks that can affect the financial health of the
entire organization. Risks, Controls and Security: Concepts
and Applications introduces you to today s control risks and
how to manage them.
Beginning with basic systems controls and security aware¬
ness, the book provides you with a clear comprehension of
the concepts, issues, and techniques of information security
in a networked environment. Moving from theory to application, you ll cover all the key
security principles that are applicable to all businesses, including e-businesses:
•
•
•
•
telecommunications
•
•
Real-world problem scenarios and a wealth of pedagogical features
tions, short exercises, example cases, and concept maps that help you visualize the
material
practice.
Designed for practicing professionals as well as for students in accounting, business man¬
agement, and computer science, Risks, Controls and Security will prepare you well for
meeting the challenge of protecting information assets.
|
any_adam_object | 1 |
author | Raval, Vasant Fichadia, Ashok |
author_facet | Raval, Vasant Fichadia, Ashok |
author_role | aut aut |
author_sort | Raval, Vasant |
author_variant | v r vr a f af |
building | Verbundindex |
bvnumber | BV020040666 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)85766845 (DE-599)BVBBV020040666 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01954nam a2200457 c 4500</leader><controlfield tag="001">BV020040666</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20070412 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">050922s2007 xx ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0471485799</subfield><subfield code="9">0-471-48579-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780471485797</subfield><subfield code="9">978-0-471-48579-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85766845</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV020040666</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-1051</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Raval, Vasant</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Risks, controls, and security</subfield><subfield code="b">concepts and applications</subfield><subfield code="c">Raval Vasant ; Ashok Fichadia</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Chichester]</subfield><subfield code="b">Wiley</subfield><subfield code="c">2007</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXII, 403 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Risikomanagement</subfield><subfield code="0">(DE-588)4121590-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="C">b</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fichadia, Ashok</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361756&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361756&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-013361756</subfield></datafield></record></collection> |
id | DE-604.BV020040666 |
illustrated | Illustrated |
indexdate | 2024-12-23T18:22:02Z |
institution | BVB |
isbn | 0471485799 9780471485797 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-013361756 |
oclc_num | 85766845 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-1051 |
owner_facet | DE-355 DE-BY-UBR DE-1051 |
physical | XXII, 403 S. Ill., graph. Darst. |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Wiley |
record_format | marc |
spellingShingle | Raval, Vasant Fichadia, Ashok Risks, controls, and security concepts and applications Computer networks Security measures Computer security Computersicherheit (DE-588)4274324-2 gnd Risikomanagement (DE-588)4121590-4 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4121590-4 (DE-588)4011144-1 |
title | Risks, controls, and security concepts and applications |
title_auth | Risks, controls, and security concepts and applications |
title_exact_search | Risks, controls, and security concepts and applications |
title_full | Risks, controls, and security concepts and applications Raval Vasant ; Ashok Fichadia |
title_fullStr | Risks, controls, and security concepts and applications Raval Vasant ; Ashok Fichadia |
title_full_unstemmed | Risks, controls, and security concepts and applications Raval Vasant ; Ashok Fichadia |
title_short | Risks, controls, and security |
title_sort | risks controls and security concepts and applications |
title_sub | concepts and applications |
topic | Computer networks Security measures Computer security Computersicherheit (DE-588)4274324-2 gnd Risikomanagement (DE-588)4121590-4 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computer networks Security measures Computer security Computersicherheit Risikomanagement Datensicherung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361756&sequence=000005&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=013361756&sequence=000006&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ravalvasant riskscontrolsandsecurityconceptsandapplications AT fichadiaashok riskscontrolsandsecurityconceptsandapplications |