Susan Lincke
Information Security Planning: A Practical Approach
Information Security Planning: A Practical Approach
YOU SAVE £7.52
- Condition: Brand new
- UK Delivery times: Usually arrives within 2 - 3 working days
- UK Shipping: Fee starts at £2.39. Subject to product weight & dimension
Bulk ordering. Want 15 or more copies? Get a personalised quote and bigger discounts. Learn more about bulk orders.
Couldn't load pickup availability
- More about Information Security Planning: A Practical Approach
This book demonstrates how information security requires a deep understanding of an organization's assets, threats, and processes, combined with the technology that can best protect organizational security. It provides step-by-step guidance on how to analyze business processes from a security perspective, while also introducing security concepts and techniques to develop the requirements and design for security technologies.
Format: Hardback
Length: 445 pages
Publication date: 17 January 2024
Publisher: Springer International Publishing AG
This comprehensive book delves into the intricate realm of information security, emphasizing the importance of a profound understanding of an organization's assets, threats, and processes, seamlessly complemented by the most effective technology to safeguard organizational security. It offers a step-by-step guide to analyzing business processes from a security perspective, while also introducing essential security concepts and techniques to develop the requirements and design for security technologies. This interdisciplinary masterpiece is tailored for business and technology audiences, spanning students and experienced professionals alike.
To embark on the journey of information security, organizations must first delve into the specific threats that their unique environment may encounter. These threats encompass a wide range of security attacks, including social engineering, fraud incidents, and various types of security breaches. Additionally, organizations must address applicable regulations and security standards, ensuring compliance and safeguarding against potential legal repercussions.
In order to mitigate these risks effectively, organizations must develop a comprehensive risk profile. This profile serves as a valuable tool for estimating the potential costs associated with security vulnerabilities, including the necessary investments in security controls. By understanding the potential financial impact, organizations can allocate resources strategically to safeguard their assets and protect against potential losses.
Security planning is a crucial step in the information security framework. It involves the design and implementation of robust information security measures, encompassing network and physical security, incident response, and metrics. This comprehensive approach ensures that organizations are well-prepared to respond to security incidents and minimize the potential damage caused by cyber threats.
Business continuity is another critical aspect of information security planning. It considers how an organization can respond to the loss of IT services, ensuring that critical business processes can continue uninterrupted even in the face of unforeseen disruptions. This includes developing backup and recovery strategies, implementing disaster recovery plans, and ensuring that critical data is securely stored and accessible.
Optional areas that may be relevant to information security include data privacy, cloud security, zero trust, secure software requirements and lifecycle, governance, introductory forensics, and ethics. These areas are constantly evolving and require organizations to stay abreast of the latest developments and best practices to ensure their security posture remains robust.
This book is specifically designed for professionals working in business, IT, security, software development, or risk management. It provides a comprehensive roadmap for implementing effective information security strategies and techniques, enabling computer science, information technology, or business students to conduct a case study for an industry of their choice. By leveraging the knowledge and insights presented in this text, professionals can enhance their understanding of information security and contribute to the overall protection of their organizations.
Weight: 863g
Dimension: 235 x 155 (mm)
ISBN-13: 9783031431173
Edition number: 2nd ed. 2024
This item can be found in:
UK and International shipping information
UK and International shipping information
UK Delivery and returns information:
- Delivery within 2 - 3 days when ordering in the UK.
- Shipping fee for UK customers from £2.39. Fully tracked shipping service available.
- Returns policy: Return within 30 days of receipt for full refund.
International deliveries:
Shulph Ink now ships to Australia, Belgium, Canada, France, Germany, Ireland, Italy, India, Luxembourg Saudi Arabia, Singapore, Spain, Netherlands, New Zealand, United Arab Emirates, United States of America.
- Delivery times: within 5 - 10 days for international orders.
- Shipping fee: charges vary for overseas orders. Only tracked services are available for most international orders. Some countries have untracked shipping options.
- Customs charges: If ordering to addresses outside the United Kingdom, you may or may not incur additional customs and duties fees during local delivery.
