Front cover; Contents; Preface; Acknowledgments; The Author; Contributors; Chapter 1. Information Security Overview; Chapter 2. Information Security Requirements; Chapter 3. Managing Risks; Chapter 4. Physical Security; Chapter 5. Business Continuity Plans and Disaster Recovery; Chapter 6. Administrative Controls; Chapter 7. Technical Controls; Chapter 8. Application Controls; Chapter 9. Perimeter Controls; Chapter 10. Audit and Compliance; Appendix A: Information Security Policy; Appendix B: Technology Resource Policy*; Appendix C: Log-on Warning Banner; Appendix D: Penetration Test Waiver
Appendix E: ToolsAppendix F: How to Report Internet Crime*; Acronyms; MyISAT; Web References; Index; Back cover
Summary
Supplying a complete overview of the concepts executives need to know, this book provides the tools needed to ensure your organization has an effective information security management program in place. It also includes a ready-to use security framework for developing workable programs and supplies proven tips for avoiding common pitfalls