The Resource Once more unto the breach : managing information security in an uncertain world, Andrea C. Simmons

Once more unto the breach : managing information security in an uncertain world, Andrea C. Simmons

Label
Once more unto the breach : managing information security in an uncertain world
Title
Once more unto the breach
Title remainder
managing information security in an uncertain world
Statement of responsibility
Andrea C. Simmons
Creator
Contributor
Provider
Subject
Language
eng
Summary
In Once more unto the Breach, Andrea C Simmons speaks directly to information security managers and provides an insider's view of the role, offering priceless gems from her extensive experience and knowledge. Based on a typical year in the life of an information security manager, the book examines how the general principles can be applied to all situations and discusses the lessons learnt from a real project
Cataloging source
CtWfDGI
http://library.link/vocab/creatorName
Simmons, Andrea C
Illustrations
illustrations
Index
no index present
LC call number
HF5548.37
LC item number
.S56 2012eb
Literary form
non fiction
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
JSTOR
http://library.link/vocab/subjectName
  • Business enterprises
  • Business enterprises
  • Information technology
  • Computer security
  • Computer networks
  • Data protection
  • Business enterprises
  • Business enterprises
  • Information technology
  • Computer security
  • Computer networks
  • Data protection
  • BUSINESS & ECONOMICS
  • BUSINESS & ECONOMICS
  • BUSINESS & ECONOMICS
  • BUSINESS & ECONOMICS
  • COMPUTERS
  • Business enterprises / Information technology / Security measures
  • Business enterprises / Computer networks / Security measures
  • Information technology / Security measures
  • Computer security / Management
  • Computer networks / Security measures
  • Data protection
Label
Once more unto the breach : managing information security in an uncertain world, Andrea C. Simmons
Instantiates
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
other
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface; About the Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project {u2026}; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); How many users are there?; How many assets require protection in your organisation?; Of the assets identified, how many servers are there?; What about information assets?; What version (or versions) of anti-virus is (are) running and how often is it (are they) being updated?; How many systems administrators are there?
  • How often are systems updated?How many exceptions (deviations) to policy are there?; When were access controls last reviewed?; What level of information security awareness is there across the organisation?; How is incident management addressed?; What about team and company communications?; What about other projects going on in your organisation at the same time?; Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Business as usual; Information ownership; Physical security; Incident
  • Password managementLaptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction; Information security policy; Managing corporate anti-virus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud Computing; Project management; Security awareness theme; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Security awareness theme
  • Chapter summaryChapter 5: December: Oh, for the sake of yet another proposal {u2026}; Security improvement programme; Fax management; Image build again; Physical security findings; Physical security solution suggestions; Other security tasks for this month; Environmental concerns; Information security awareness briefings; 'Kit' movement; Laptop users {u2026} again!; Security awareness theme; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management
  • Penetration testing resultsBack to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Job descriptions; Users' understanding; People management; Security awareness theme; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy; UK Data Protection Act 1998, seventh principle; Other security tasks for this month; User administration; Inventory management; Security awareness theme; Chapter summary
Dimensions
unknown
Extent
1 online resource
Form of item
online
Isbn
9781849283892
Media category
computer
Media MARC source
rdamedia
Media type code
c
Specific material designation
remote
Stock number
  • CL0500000301
  • 22573/ctt4k5c0r
System control number
  • (OCoLC)833573774
  • (OCoLC)ocn833573774
Label
Once more unto the breach : managing information security in an uncertain world, Andrea C. Simmons
Publication
Bibliography note
Includes bibliographical references
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
other
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
  • Preface; About the Author; Acknowledgements; Contents; Introduction; Chapter 1: August: Pulling a team together; It's not a project {u2026}; Make friends and influence people; There's always a need for a 'list' (well, if it's good enough for Santa Claus!); How many users are there?; How many assets require protection in your organisation?; Of the assets identified, how many servers are there?; What about information assets?; What version (or versions) of anti-virus is (are) running and how often is it (are they) being updated?; How many systems administrators are there?
  • How often are systems updated?How many exceptions (deviations) to policy are there?; When were access controls last reviewed?; What level of information security awareness is there across the organisation?; How is incident management addressed?; What about team and company communications?; What about other projects going on in your organisation at the same time?; Project management; Chapter summary; Chapter 2: September: Street trash; Introduction; Incompatible software; Remote workers; User acceptance testing; Business as usual; Information ownership; Physical security; Incident
  • Password managementLaptop management; Chapter summary; Chapter 3: October: Compliance may be only skin deep; Introduction; Information security policy; Managing corporate anti-virus; Standard build and image; Password management (again); Consumerisation; Third-party management; Audit log management; Vulnerability management; Cloud Computing; Project management; Security awareness theme; Chapter summary; Chapter 4: November: How remote is remote?; Introduction; Location, location, location; Innovation, innovation, innovation; Information labelling; Lessons learnt; Security awareness theme
  • Chapter summaryChapter 5: December: Oh, for the sake of yet another proposal {u2026}; Security improvement programme; Fax management; Image build again; Physical security findings; Physical security solution suggestions; Other security tasks for this month; Environmental concerns; Information security awareness briefings; 'Kit' movement; Laptop users {u2026} again!; Security awareness theme; Chapter summary; Chapter 6: January: A battle won; Baking security in; Desktop refresh versus consumerisation; Incident reporting; Data-sharing protocols; Linking InfoSec with records management
  • Penetration testing resultsBack to physical security issues; Reduce, reuse, recycle; Other security tasks for this month; Job descriptions; Users' understanding; People management; Security awareness theme; Chapter summary; Chapter 7: February: Money doesn't buy happiness; Divide and conquer?; Remember the big picture; Breadth of technological change; Embracing data protection and privacy; UK Data Protection Act 1998, seventh principle; Other security tasks for this month; User administration; Inventory management; Security awareness theme; Chapter summary
Dimensions
unknown
Extent
1 online resource
Form of item
online
Isbn
9781849283892
Media category
computer
Media MARC source
rdamedia
Media type code
c
Specific material designation
remote
Stock number
  • CL0500000301
  • 22573/ctt4k5c0r
System control number
  • (OCoLC)833573774
  • (OCoLC)ocn833573774

Library Locations

  • African Studies LibraryBorrow it
    771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Alumni Medical LibraryBorrow it
    72 East Concord Street, Boston, MA, 02118, US
    42.336388 -71.072393
  • Astronomy LibraryBorrow it
    725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US
    42.350259 -71.105717
  • Fineman and Pappas Law LibrariesBorrow it
    765 Commonwealth Avenue, Boston, MA, 02215, US
    42.350979 -71.107023
  • Frederick S. Pardee Management LibraryBorrow it
    595 Commonwealth Avenue, Boston, MA, 02215, US
    42.349626 -71.099547
  • Howard Gotlieb Archival Research CenterBorrow it
    771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Mugar Memorial LibraryBorrow it
    771 Commonwealth Avenue, Boston, MA, 02215, US
    42.350723 -71.108227
  • Music LibraryBorrow it
    771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350723 -71.108227
  • Pikering Educational Resources LibraryBorrow it
    2 Silber Way, Boston, MA, 02215, US
    42.349804 -71.101425
  • School of Theology LibraryBorrow it
    745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US
    42.350494 -71.107235
  • Science & Engineering LibraryBorrow it
    38 Cummington Mall, Boston, MA, 02215, US
    42.348472 -71.102257
  • Stone Science LibraryBorrow it
    675 Commonwealth Avenue, Boston, MA, 02445, US
    42.350103 -71.103784
Processing Feedback ...