Computer Security Management

Karen A. Forcht

Publisher: Boyd and Fraser, 1994, 486 pages

ISBN: 0-87835-881-1

Keywords: IT Security, Information Security

Last modified: May 18, 2021, 6:24 p.m.

Coverage of important security topics from a practical, business-oriented perspective.

Computer Security Management provides a broad overview of computer security and offers guidance for improving business systems, procedures, and the skills of personnel.

Here are some highlights:

  • State-of-the-art coverage with an emphasis on future trends. Promotes the concept that an effective manager must always stay current on security matters.
  • A comprehensive chapter on viruses and other forms of malicious code provides descriptive background and offers popular prevention and remedial options.
  • Discusses legal aspects of computer security with an eye toward effective management.
  • Stresses the principle that planning ahead of time is better than after-the-fact punishment or reorganization after the damage has been done. A chapter on computer ethics introduces this preventative aspect of computer security.
  • Thorough coverage of planning for natural disasters. Details contingency plans to minimize effects of natural disasters and outlines rapid recovery techniques.
  • Each chapter opens with a contemporary vignette that focuses on real business situations relevant to the material covered within the chapter. Problem-solving exercises and in-depth case studies are also offered.
  1. Introduction to Computer Security
    1. Overview of Computer Security
      • Why Worry About Computer Security?
      • Ethical Considerations
      • Threats to Security
      • Security Measures
      • End-of-Chapter Materials
    2. Physical Protection
      • Natural Disasters
      • Physical Facilities
      • Access Controls
      • End-of-Chapter Materials
  2. Systems Security and Control
    1. Hardware Security Controls
      • The Total System Needs Securing
      • Levels of Hardware Controls
      • Operating Systems Controls
      • Access Controls
      • General-Purpose Operating Systems Security
      • Sources of Additional Information
      • End-of-Chapter Materials
    2. Software Controls
      • Software Security and Controls
      • Types of Software Intrusions
      • Configuration Management
      • Modularity and Encapsulation
      • Protecting Information
      • The Orange Book
      • Selecting Security Software
      • Analysis of Software Products
      • End-of-Chapter Materials
    3. Encryption Techniques
      • Encryption Overview
      • Types of Ciphers
      • Types of Keys
      • The Data Encryption Standard (DES)
      • Guidelines for Use of Encryption
      • End-of-Chapter Materials
  3. Special Considerations
    1. Database Security
      • Introduction to Databases
      • Security Requirements of Databases
      • Designing Database Security
      • Methods of Protection
      • Security of Multilevel Databases
      • The Future of Databases
      • End-of-Chapter Materials
    2. Network and Telecommunications Security
      • Telecommunications and Networks
      • Security Considerations
      • Cases in Point
      • Special Communications Security Considerations
      • Thoughts About the Future
      • End-of-Chapter Materials
    3. Microcomputer Security
      • Microcomputer Problems and Solutions
      • The Microcomputer Environment
      • Security of Microcomputers
      • Internal Data Security
      • The Threats to Micros
      • Developing a Micros Security Plan
      • Establishing a Micro-to-Mainframe Link
      • Portable Microcomputer Security
      • Password Protection
      • Security of Special Micro Applications
      • End-of-Chapter Materials
    4. Viruses
      • History of Viruses
      • Anatomy of Viruses
      • Categories of Viruses and How They Work
      • How Viruses Spread
      • Pseudo-Virus Programs
      • Motivation to Create Viruses
      • Know Viruses
      • Detection and Eradication
      • Virus Protection Packages
      • International Perspectives
      • The Future of Viruses
      • End-of-Chapter Materials
  4. Legal and Ethical Issues
    1. Legal Issues and Current Legislation
      • Defining Computer Crime
      • Methods of Computer Crime
      • Types of Computer Crime
      • Software Violations
      • Software Piracy
      • Consultants and Outside Contractors
      • Crimes Against Computer Systems
      • Computer Crime Legislation
      • Privacy Considerations
      • Conclusion
      • End-of-Chapter Materials
    2. Ethical Use of Computers
      • Defining Ethics
      • Professional Codes of Ethics
      • Corporate Policies of Ethics
      • Academic Institutions Integrating Ethics into Classes
      • Scenarios to Ponder
      • End-of-Chapter Materials
  5. Managerial Issues
    1. Managerial Issues
      • Determination of Goals and Priorities
      • Information Classification, Ownership, and Valuation
      • Locating and Training Computer Security Personnel
      • Budget Constraints
      • Security Training and Awareness
      • Evaluating and Updating Security Programs
      • Disclosure of Security Violations
      • Critical Management Issues in Computer Security
      • End-of-Chapter Materials
    2. Disaster Recovery and Contingency Planning
      • Crisis Management
      • Risk Analysis
      • Security Plan
      • Backup Procedures
      • Insurance
      • Training of Employees
      • Testing the Plan
      • Scenario of Actual Disasters
      • End-of-Chapter Materials
    3. New Technologies and Future Trends
      • The Future Is Now
      • International Issues
      • Privacy Concerns
      • Ergonomics
      • New Technologies
      • End-of-Chapter Materials

Reviews

Computer Security Management

Reviewed by Roland Buresund

Good ******* (7 out of 10)

Last modified: Nov. 14, 2008, 4:32 p.m.

A very good book that nobody seems to have knowledge about. Its a shame, recommended.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required