9780763738198

Information Security : Contemporary Cases

by
  • ISBN13:

    9780763738198

  • ISBN10:

    0763738190

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2006-06-15
  • Publisher: Ecampus Direct

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $78.58 Save up to $52.34
  • Rent Book $26.24
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE
    HURRY! ONLY 3 COPIES IN STOCK AT THIS PRICE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Used and Rental copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

Information Security: Contemporary Cases  addresses fundamental information security concepts in realistic scenarios.  Through a series of substantive cases, different aspects of information security are addressed by real organizations.  the organizations include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center for Emergency Preparedness and Disaster Response.  Case topics include data protection, integrating IT and physical security, contingency planning, disaster recovery, network security, hardware design, encryption, standards compliance, tracking intruders, and training and awareness programs.  This casebook will enable students to develop the practical understanding needed for today's information security/information assurance profession.  

Table of Contents

1. Kraft Foods Inc.: Protecting Employee Data 1(24)
Kraft Foods Inc.
2(1)
History
2(4)
Structure
6(3)
Human Resources Technology and Information
9(2)
European Union Directive on the Protection of Personal Date
11(1)
Human Resources Systems and Processes
12(1)
Data Transfer Agreement
13(2)
Ensuring the Privacy of Personal Employee Data
15(4)
Final Comments
19(1)
Endnotes
20(2)
Case Study Questions
22(1)
Key Terms
23(2)
2. Advo, Inc.: Integrating IT and Physical Security 25(36)
Advo, Inc.—The Company
26(1)
Operations
27(2)
Security Controls Before the Terrorist and Bioterrorist-Related Attacks
29(2)
Terrorist and Bioterrorist-Related Attacks
31(1)
Advo's Response to the Anthrax Attacks
32(1)
Strengthening Security
33(3)
Integrated Security Management System
36(3)
System Security
39(2)
Security Audits
41(1)
Final Comments
41(1)
Appendix A: Key Areas and Specific Audit Points
42(12)
Endnotes
54(2)
Case Study Questions
56(1)
Key Terms
57(4)
3. Yale New Haven Center for Emergency Preparedness and Disaster Response: Contingency Planning 61(28)
Yale New Haven Health System
62(2)
Yale New Haven Center for Emergency Preparedness and Disaster Response
64(3)
Disaster Planning
67(5)
Disaster Planning: YNHHS
67(2)
Disaster Planning: State of Connecticut
69(2)
Disaster Planning: Regional, National, and International
71(1)
Education and Training
72(3)
Clinical Strategies
75(2)
Logistical Solutions
77(5)
Medical Personnel
77(1)
Facilities
78(1)
Equipment and Supplies
79(1)
Emergency Communication Systems
80(2)
Final Comments
82(1)
Endnotes
82(4)
Case Study Questions
86(1)
Key Terms
87(2)
4. IBM: The Embedded Security Subsystem 89(26)
IBM—The Company
90(1)
Abbreviated Organizational Structure
91(2)
IBM Watson Research—Global Security Analysis Lab
93(1)
Embedded Security Subsystem Version 1.0
94(2)
Promoting Open Standards
96(1)
Embedded Security Subsystem Version 2.0
96(4)
Controlling the ESS 2.0 Chip
100(1)
Final Comments
101(1)
Appendix A: Network Threats
101(2)
Appendix B: RSA Algorithm
103(2)
Appendix C: Common Criteria
105(1)
Appendix D: SHA-1 and SHA-256
106(1)
Endnotes
107(1)
Case Study Questions
108(1)
Key Terms
109(6)
5. SRA International, Inc.: Automating Compliance with Federal Information Security Requirements 115(46)
SRA International, Inc.—The Company
116(9)
Market Sectors
117(4)
Services and Business Solutions
121(4)
Federal Government Information Security Requirements
125(5)
Federal Information Security Management Act
126(1)
Federal Government Information Security Standards and Controls
127(3)
Facilitating Information Security Compliance
130(22)
Final Comments
152(1)
Endnotes
153(3)
Case Study Questions
156(1)
Key Terms
157(4)
6. FBI New Haven Field Office—Computer Analysis and Response Team: Tracking a Computer Intruder 161(26)
Federal Bureau of Investigation Overview
162(1)
FBI Laboratory and CART
162(3)
FBI New Haven Field Office
165(1)
Computer Intrusion at BoatingCT.com
166(1)
FBI Analysis
167(7)
Seizing the Evidence and Performing Forensic Analysis
174(1)
Arrest and Sentencing
175(5)
Appendix A: Gathering Information from the E-mail Header
180(2)
Endnotes
182(1)
Case Study Questions
183(1)
Key Terms
184(3)
7. Aetna: Developing and Implementing a Successful Information Security Awareness Program 187(22)
Aetna—The Company
188(1)
History
188(1)
Information Security
189(3)
Information Security Program Organization
192(1)
Information Security Awareness Program
193(3)
InfoSec Exam Overview
196(5)
InfoSec Exam—Design and Development
201(2)
Implementation
203(1)
Compliance
204(1)
Endnotes
204(1)
Case Study Questions
205(1)
Key Terms
206(3)
Index 209

Rewards Program

Write a Review