The Resource Business continuity and disaster recovery for infosec managers, John W. Rittinghouse, James F. Ransome, (electronic resource)

Business continuity and disaster recovery for infosec managers, John W. Rittinghouse, James F. Ransome, (electronic resource)

Label
Business continuity and disaster recovery for infosec managers
Title
Business continuity and disaster recovery for infosec managers
Statement of responsibility
John W. Rittinghouse, James F. Ransome
Title variation
Business continuity and disaster recovery for information security managers
Creator
Contributor
Subject
Genre
Language
  • eng
  • eng
Summary
Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or communications systems. Since 9/11 it has become increasingly important for companies to implement a plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer. This book has been written by battle tested security consultants who have based all the material, processes a
Cataloging source
MiAaPQ
http://library.link/vocab/creatorName
Rittinghouse, John W
Dewey number
  • 004/.0068/4
  • 658.478
Illustrations
illustrations
Index
index present
Language note
English
LC call number
HF5548.37
LC item number
.R58 2005
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Ransome, James F
http://library.link/vocab/subjectName
  • Business
  • Crisis management
  • Computer networks
  • Information resources management
Label
Business continuity and disaster recovery for infosec managers, John W. Rittinghouse, James F. Ransome, (electronic resource)
Instantiates
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references (p. 275-281) and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; Business Continuity and Disaster Recovery for InfoSec Managers; Copyright Page; Contents; Foreword; Foreword by Mr. Paul Kurtz; Introduction; Introduction: Business Security 101; The State of the BCP and Network Disaster Recovery Industry: Where Are We and Why?; Threats to Personal Privacy; Fraud and Theft; Internet Fraud; Employee Sabotage; Infrastructure Attacks; Malicious Hackers; Malicious Coders; Industrial Espionage; Social Engineering; Educate Staff and Security Personnel; Managing Access; Physical Access; Access Control; Access Control Models; Password Management
  • Security Management PracticesChapter Summary; Endnotes; Acknowledgments; Chapter 1. Contingency and Continuity Planning; 1.1 Business Continuity Planning; 1.2 BCP Standards and Guidelines; 1.3 BCP Project Organization; 1.4 Chapter Summary; 1.5 Endnotes; Chapter 2. Assessing Risk; 2.1 Determining Threats; 2.2 Risk Management; 2.3 The Risk Manager; 2.4 Risk Assessment; 2.5 Emergency Incident Assessment; 2.6 Business Risk Assessment; 2.7 Business Impact Analysis (BIA); 2.8 Information Security, IT and Communications; 2.9 Chapter Summary; 2.10 Endnotes; Chapter 3. Mitigation Strategies
  • 3.1 Preventative Measures for Information Security Managers3.2 Information Security Preventative Controls; 3.3 Other Preventative Controls; 3.4 Summary of Existing Emergency Procedures; 3.5 Key Personnel for Handling Emergency Procedures; 3.6 External Emergency Services; 3.7 Premises Issues; 3.8 Chapter Summary; 3.9 Endnotes; Chapter 4. Preparing for a Possible Emergency; 4.1 Backup and Recovery Procedures; 4.2 IT Systems Recovery; 4.3 Key BCP Personnel and Supplies; 4.4 Key Documents and Procedures; 4.5 Chapter Summary; 4.6 Endnotes; Chapter 5. Disaster Recovery Phase
  • 5.1 Disaster Recovery Legal Issues5.2 Planning for Handling the Emergency; 5.3 Disaster Recovery Team Management Actions; 5.4 Notification and Reporting in Disaster Recovery Phase; 5.5 Disaster Recovery Phase Report; 5.6 Chapter Summary; 5.7 Endnotes; Chapter 6. Business Recovery Phase; 6.1 Business Recovery Planning Process; 6.2 Planning Business Recovery Activities; 6.3 Chapter Summary; Chapter 7. Testing, Auditing, and Training; 7.1 Testing the Business Recovery Process; 7.2 Security Testing; 7.3 The Open Source Security Testing Methodology Manual; 7.4 Monitoring and Updating
  • 7.5 Hardening Systems7.6 System Patches; 7.7 Auditing Fundamentals; 7.8 Auditor's Role in Developing Security Policies; 7.9 Auditing Standards and Groups; 7.10 Audit Oversight Committee; 7.11 Auditing and Assessment Strategies; 7.12 Basic Audit Methods and Tools; 7.13 General Information Systems (IS) Audit Process; 7.14 Perimeter Audits; 7.15 Using Nmap; 7.16 Mapping the Network with Nmap; 7.17 Analyzing Nmap Scan Results; 7.18 Penetration Testing Using Nessus; 7.19 Training Staff for the Business Recovery Process; 7.20 Chapter Summary; 7.21 Endnotes
  • Chapter 8. Maintaining a Business Continuity Plan
Dimensions
unknown
Extent
1 online resource (409 p.)
Form of item
online
Isbn
9780080528335
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)333980
  • (OCoLC)437202747
  • (SSID)ssj0000116129
  • (PQKBManifestationID)11131896
  • (PQKBTitleCode)TC0000116129
  • (PQKBWorkID)10050793
  • (PQKB)10850590
  • (MiAaPQ)EBC333980
  • (EXLCZ)991000000000384444
Label
Business continuity and disaster recovery for infosec managers, John W. Rittinghouse, James F. Ransome, (electronic resource)
Publication
Note
Description based upon print version of record
Bibliography note
Includes bibliographical references (p. 275-281) and index
Carrier category
online resource
Carrier category code
cr
Content category
text
Content type code
txt
Contents
  • Front Cover; Business Continuity and Disaster Recovery for InfoSec Managers; Copyright Page; Contents; Foreword; Foreword by Mr. Paul Kurtz; Introduction; Introduction: Business Security 101; The State of the BCP and Network Disaster Recovery Industry: Where Are We and Why?; Threats to Personal Privacy; Fraud and Theft; Internet Fraud; Employee Sabotage; Infrastructure Attacks; Malicious Hackers; Malicious Coders; Industrial Espionage; Social Engineering; Educate Staff and Security Personnel; Managing Access; Physical Access; Access Control; Access Control Models; Password Management
  • Security Management PracticesChapter Summary; Endnotes; Acknowledgments; Chapter 1. Contingency and Continuity Planning; 1.1 Business Continuity Planning; 1.2 BCP Standards and Guidelines; 1.3 BCP Project Organization; 1.4 Chapter Summary; 1.5 Endnotes; Chapter 2. Assessing Risk; 2.1 Determining Threats; 2.2 Risk Management; 2.3 The Risk Manager; 2.4 Risk Assessment; 2.5 Emergency Incident Assessment; 2.6 Business Risk Assessment; 2.7 Business Impact Analysis (BIA); 2.8 Information Security, IT and Communications; 2.9 Chapter Summary; 2.10 Endnotes; Chapter 3. Mitigation Strategies
  • 3.1 Preventative Measures for Information Security Managers3.2 Information Security Preventative Controls; 3.3 Other Preventative Controls; 3.4 Summary of Existing Emergency Procedures; 3.5 Key Personnel for Handling Emergency Procedures; 3.6 External Emergency Services; 3.7 Premises Issues; 3.8 Chapter Summary; 3.9 Endnotes; Chapter 4. Preparing for a Possible Emergency; 4.1 Backup and Recovery Procedures; 4.2 IT Systems Recovery; 4.3 Key BCP Personnel and Supplies; 4.4 Key Documents and Procedures; 4.5 Chapter Summary; 4.6 Endnotes; Chapter 5. Disaster Recovery Phase
  • 5.1 Disaster Recovery Legal Issues5.2 Planning for Handling the Emergency; 5.3 Disaster Recovery Team Management Actions; 5.4 Notification and Reporting in Disaster Recovery Phase; 5.5 Disaster Recovery Phase Report; 5.6 Chapter Summary; 5.7 Endnotes; Chapter 6. Business Recovery Phase; 6.1 Business Recovery Planning Process; 6.2 Planning Business Recovery Activities; 6.3 Chapter Summary; Chapter 7. Testing, Auditing, and Training; 7.1 Testing the Business Recovery Process; 7.2 Security Testing; 7.3 The Open Source Security Testing Methodology Manual; 7.4 Monitoring and Updating
  • 7.5 Hardening Systems7.6 System Patches; 7.7 Auditing Fundamentals; 7.8 Auditor's Role in Developing Security Policies; 7.9 Auditing Standards and Groups; 7.10 Audit Oversight Committee; 7.11 Auditing and Assessment Strategies; 7.12 Basic Audit Methods and Tools; 7.13 General Information Systems (IS) Audit Process; 7.14 Perimeter Audits; 7.15 Using Nmap; 7.16 Mapping the Network with Nmap; 7.17 Analyzing Nmap Scan Results; 7.18 Penetration Testing Using Nessus; 7.19 Training Staff for the Business Recovery Process; 7.20 Chapter Summary; 7.21 Endnotes
  • Chapter 8. Maintaining a Business Continuity Plan
Dimensions
unknown
Extent
1 online resource (409 p.)
Form of item
online
Isbn
9780080528335
Media category
computer
Media type code
c
Specific material designation
remote
System control number
  • (EBL)333980
  • (OCoLC)437202747
  • (SSID)ssj0000116129
  • (PQKBManifestationID)11131896
  • (PQKBTitleCode)TC0000116129
  • (PQKBWorkID)10050793
  • (PQKB)10850590
  • (MiAaPQ)EBC333980
  • (EXLCZ)991000000000384444

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...