The Resource Assessing information security : strategies, tactics, logic and framework, A. Vladimirov, K. Gavrilenko, A. Michajlowski

Assessing information security : strategies, tactics, logic and framework, A. Vladimirov, K. Gavrilenko, A. Michajlowski

Label
Assessing information security : strategies, tactics, logic and framework
Title
Assessing information security
Title remainder
strategies, tactics, logic and framework
Statement of responsibility
A. Vladimirov, K. Gavrilenko, A. Michajlowski
Creator
Contributor
Author
Provider
Subject
Language
eng
Summary
Build a strategic response to cyber attacks The activities of the cyber criminal are both deliberate and hostile, and they can be compared to military operations. Many people in business understand that the insights from the classics of military strategy are as relevant to modern commerce as they are to war. It is clear that organisations need to develop a view of cybersecurity that goes beyond technology: all staff in the organisation have a role to play, and it is the senior managers who must ensure, like generals marshalling their forces, that all staff know the cyber security policies that
Cataloging source
N$T
http://library.link/vocab/creatorName
Vladimirov, Andrew A
Index
no index present
LC call number
QA76.9.A25
LC item number
V53 2014
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Gavrilenko, Konstantin
  • Michajlowski, Anej
  • JSTOR
http://library.link/vocab/subjectName
  • Computer security
  • Information technology
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Computer security
  • Information technology
Label
Assessing information security : strategies, tactics, logic and framework, A. Vladimirov, K. Gavrilenko, A. Michajlowski
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • ""Cover""; ""Title""; ""Copyright""; ""Contents""; ""Introduction""; ""Chapter 1: Information Security Auditing and Strategy""; ""The mindsets of ignorance""; ""Defence-in-depth""; ""Compelling adversaries to adapt""; ""Chapter 2: Security Auditing, Governance, Policies and Compliance""; ""General security policy shortcomings""; ""Addressing security audits in policy statements""; ""The erroneous path to compliance""; ""Getting down to earth""; ""Chapter 3: Security Assessments Classification""; ""Black, grey and white box tests""; ""Assessments specialisations and actual scopes""
  • ""On technical information security assessments""""Server, client and network-centric tests""; ""IT security testing levels and target areas""; ""'Idiosyncratic' technical security tests""; ""On non-technical information security audits""; ""Premises and physical security checks""; ""Social engineering tests""; ""Security documentation reviews""; ""Assessing security processes""; ""Chapter 4: Advanced Pre-Assessment Planning""; ""The four-stage framework""; ""Selecting the targets of assessment""; ""Evaluating what is on offer""; ""Professional certifications and education""
  • ""Publications and tools""""The auditor company history and size""; ""Dealing with common assessment emergencies""; ""Chapter 5: Security Audit Strategies and Tactics""; ""Centres of gravity and their types""; ""Identifying critical points""; ""The strategic exploitation cycle""; ""External technical assessment recon""; ""Social engineering recon""; ""Internal technical assessment recon""; ""Technical vulnerability discovery process""; ""A brief on human vulnerabilities""; ""The tactical exploitation cycle""; ""Front, flank, simple, complex""; ""The strategies of creating gaps""
  • ""Chapter 6: Synthetic Evaluation of Risks""""Risk, uncertainty and ugly Black Swans""; ""On suitable risk analysis methodologies""; ""On treatment of information security risks""; ""Relevant vulnerability categories""; ""Gauging attacker skill""; ""Weighting vulnerability impact""; ""Contemplating the vulnerability remedy""; ""Defining vulnerability risk level""; ""Risks faced by large components""; ""Compound risks, systempunkts and attacker logic""; ""Total risk summary utilisation and dissection""; ""Chapter 7: Presenting the Outcome and Follow-Up Acts""; ""The report audience and style""
  • ""The report summary""""The report interpretation chapter""; ""The bulk of the report""; ""Explaining the overall security state""; ""Elaborating on breakdown of risks""; ""Using vulnerability origin investigations""; ""Post-audit assistance and follow-up hurdles""; ""Chapter 8: Reviewing Security Assessment Failures and Auditor Management Strategies""; ""Bad tactics and poor tests""; ""On the assessment team ordnance""; ""Of serpents and eagles""; ""ITG Resources""
Dimensions
unknown
Edition
Second edition.
Extent
1 online resource (424 pages)
File format
unknown
Form of item
online
Isbn
9781849286008
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
Stock number
22573/ctt14gss9n
System control number
  • (OCoLC)905696121
  • (OCoLC)ocn905696121
Label
Assessing information security : strategies, tactics, logic and framework, A. Vladimirov, K. Gavrilenko, A. Michajlowski
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • ""Cover""; ""Title""; ""Copyright""; ""Contents""; ""Introduction""; ""Chapter 1: Information Security Auditing and Strategy""; ""The mindsets of ignorance""; ""Defence-in-depth""; ""Compelling adversaries to adapt""; ""Chapter 2: Security Auditing, Governance, Policies and Compliance""; ""General security policy shortcomings""; ""Addressing security audits in policy statements""; ""The erroneous path to compliance""; ""Getting down to earth""; ""Chapter 3: Security Assessments Classification""; ""Black, grey and white box tests""; ""Assessments specialisations and actual scopes""
  • ""On technical information security assessments""""Server, client and network-centric tests""; ""IT security testing levels and target areas""; ""'Idiosyncratic' technical security tests""; ""On non-technical information security audits""; ""Premises and physical security checks""; ""Social engineering tests""; ""Security documentation reviews""; ""Assessing security processes""; ""Chapter 4: Advanced Pre-Assessment Planning""; ""The four-stage framework""; ""Selecting the targets of assessment""; ""Evaluating what is on offer""; ""Professional certifications and education""
  • ""Publications and tools""""The auditor company history and size""; ""Dealing with common assessment emergencies""; ""Chapter 5: Security Audit Strategies and Tactics""; ""Centres of gravity and their types""; ""Identifying critical points""; ""The strategic exploitation cycle""; ""External technical assessment recon""; ""Social engineering recon""; ""Internal technical assessment recon""; ""Technical vulnerability discovery process""; ""A brief on human vulnerabilities""; ""The tactical exploitation cycle""; ""Front, flank, simple, complex""; ""The strategies of creating gaps""
  • ""Chapter 6: Synthetic Evaluation of Risks""""Risk, uncertainty and ugly Black Swans""; ""On suitable risk analysis methodologies""; ""On treatment of information security risks""; ""Relevant vulnerability categories""; ""Gauging attacker skill""; ""Weighting vulnerability impact""; ""Contemplating the vulnerability remedy""; ""Defining vulnerability risk level""; ""Risks faced by large components""; ""Compound risks, systempunkts and attacker logic""; ""Total risk summary utilisation and dissection""; ""Chapter 7: Presenting the Outcome and Follow-Up Acts""; ""The report audience and style""
  • ""The report summary""""The report interpretation chapter""; ""The bulk of the report""; ""Explaining the overall security state""; ""Elaborating on breakdown of risks""; ""Using vulnerability origin investigations""; ""Post-audit assistance and follow-up hurdles""; ""Chapter 8: Reviewing Security Assessment Failures and Auditor Management Strategies""; ""Bad tactics and poor tests""; ""On the assessment team ordnance""; ""Of serpents and eagles""; ""ITG Resources""
Dimensions
unknown
Edition
Second edition.
Extent
1 online resource (424 pages)
File format
unknown
Form of item
online
Isbn
9781849286008
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
Stock number
22573/ctt14gss9n
System control number
  • (OCoLC)905696121
  • (OCoLC)ocn905696121

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...