000012916 000__ 04399cam\a2200481\i\4500 000012916 001__ 12916 000012916 003__ SzGeWIPO 000012916 005__ 20210318092547.0 000012916 008__ 010629s2002\\\\flua\\\\rb\\\\001\0\eng\c 000012916 020__ $$a0849311632 000012916 020__ $$z9780849311635$$qalk. paper 000012916 020__ $$z9781420031492$$qe-book 000012916 020__ $$z142003149X$$qe-book 000012916 020__ $$z0203972929$$qelectronic book 000012916 020__ $$z9780203972922$$qelectronic book 000012916 020__ $$z1281122300 000012916 020__ $$z9781281122308 000012916 020__ $$z9781466546448 000012916 020__ $$z1466546441 000012916 035__ $$a(wipo)(CD )02-0552 000012916 035__ $$a(OCoLC)51684197 000012916 040__ $$aSzGeWIPO$$beng$$erda$$cSzGeWIPO$$dCaBNVSL 000012916 050_4 $$aQA76.9.A25$$bH47 2001 000012916 08204 $$a005.8$$221 000012916 084__ $$aD 710 HER.P 000012916 090__ $$c13506$$d13506 000012916 1001_ $$aHerrmann, Debra S.,$$eauthor. 000012916 24512 $$aA practical guide to security engineering and information assurance /$$cDebra S. Herrmann. 000012916 264_1 $$aBoca Raton, FL :$$bAuerbach Publications,$$cc2002. 000012916 300__ $$axiii, 393 pages :$$billustrations ;$$c26 cm 000012916 336__ $$atext$$btxt$$2rdacontent 000012916 337__ $$aunmediated$$bn$$2rdamedia 000012916 338__ $$avolume$$bnc$$2rdacarrier 000012916 500__ $$aNebent.: Security engineering and information assurance. 000012916 504__ $$aIncludes bibliographical references (pages 362-372) and index. 000012916 5050_ $$aIntroduction; Background; Purpose; Scope; Intended Audience; Organization; What is Information Assurance, How Does it Relate to Information Security, and Why Are Both Needed?; Definition; Application Domains; Technology Domains; Importance; Stakeholders; Summary; Discussion Problems; Historical Approaches to Information Security and Information Assurance; Physical Security; Communications Security (COMSEC); Computer Security (COMPUSEC); Information Security (INFOSEC); Operations Security (OPSEC); System Safety; System Reliability; Summary; Discussion Problems; Define the System Boundaries; Determine What is Being Protected and Why; Identify the System; Characterize System Operation; Ascertain What You Do/Do Not Have Control Over; Summary; Discussion Problems; Perform Vulnerability and Threat Analyses; Definitions; Select/Use IA Analysis Techniques; Identify Vulnerabilities, Their Type, Source,. 000012916 520__ $$aToday the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority. A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise. The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system. The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security A techniques, approaches, and best practices. As this book will show you, there is considerably more to information security A than firewalls, encryption, and virus protection. 000012916 650_0 $$aData protection. 000012916 650_4 $$aINFORMATION SCIENCE (DOCUMENTATION) : AUTOMATED INFORMATION PROCESSING TOOLS : COMPUTER SECURITY 000012916 7001_ $$aHerrmann, Debra S. 000012916 903__ $$v1 000012916 942__ $$cMON 000012916 980__ $$aBIB 000012916 999__ $$c13506$$d13506