Skip to content Skip to footer
-70%

Fundamentals of Information Systems Security 4th Edition by David Kim, ISBN-13: 978-1284220735

Original price was: $50.00.Current price is: $14.99.

 Safe & secure checkout

Description

Description

Trustpilot

Fundamentals of Information Systems Security 4th Edition by David Kim, ISBN-13: 978-1284220735

[PDF eBook eTextbook] – Available Instantly

  • Publisher: ‎ Jones & Bartlett Learning; 4th edition (December 24, 2021)
  • Language: ‎ English
  • ISBN-10: ‎ 1284220737
  • ISBN-13: ‎ 978-1284220735

Revised and updated with the latest trends and information in the field, Fundamentals of Information Systems Security, Fourth Edition provides a comprehensive overview of the concepts readers must know as they pursue careers in information systems security. The text opens with a discussion of emerging technologies and the risks, threats, and vulnerabilities associated with our digital world. Part II takes a deeper dive into the foundational knowledge areas and functions associated with a career in information security. The book closes with a survey of information security standards, professional certifications, and compliance laws. With its practical, conversational writing style and step-by-step examples, this text is a must-have resource for those entering the world of information systems security.

Table of Contents:

Cover

Title Page

Copyright Page

Dedication Page

Contents

Preface

New to This Edition

Acknowledgments

The Authors

CHAPTER 1 Information Systems Security

Information Systems Security

Risks, Threats, and Vulnerabilities

What Is Information Systems Security?

Compliance Laws and Regulations Drive the Need for Information Systems Security

Tenets of Information Systems Security

Confidentiality

Integrity

Availability

The Seven Domains of a Typical IT Infrastructure

User Domain

Workstation Domain

LAN Domain

LAN-to-WAN Domain

WAN Domain

Remote Access Domain

System/Application Domain

Weakest Link in the Security of an IT Infrastructure

Ethics and the Internet

IT Security Policy Framework

Definitions

Foundational IT Security Policies

Data Classification Standards

Chapter Summary

Key Concepts and Terms

Chapter 1 Assessment

CHAPTER 2 Emerging Technologies Are Changing How We Live

Evolution of the Internet of Things

Converting to a Tcp/Ip World

IoT’s Impact on Human and Business Life

How People Like to Communicate

IoT Applications That Impact Our Lives

Evolution from Brick and Mortar to E-Commerce

Why Businesses Must Have an Internet and IoT Marketing Strategy

IP Mobility

Mobile Users and Bring Your Own Device

Mobile Applications

IP Mobile Communications

New Challenges Created by the IoT

Security

Privacy

Interoperability and Standards

Legal and Regulatory Issues

E-Commerce and Economic Development Issues

Chapter Summary

Key Concepts and Terms

Chapter 2 Assessment

CHAPTER 3 Risks, Threats, and Vulnerabilities

Risk Management and Information Security

Risk Terminology

Elements of Risk

Purpose of Risk Management

The Risk Management Process

Identify Risks

Assess and Prioritize Risks

Plan a Risk Response Strategy

Implement the Risk Response Plan

Monitor and Control Risk Response

IT and Network Infrastructure

Intellectual Property

Finances and Financial Data

Service Availability and Productivity

Reputation

Who Are the Perpetrators?

Risks, Threats, and Vulnerabilities in an IT Infrastructure

Threat Targets

Threat Types

What Is a Malicious Attack?

Birthday Attacks

Brute-Force Password Attacks

Credential Harvesting and Stuffing

Dictionary Password Attacks

IP Address Spoofing

Hijacking

Replay Attacks

Man-in-the-Middle Attacks

Masquerading

Eavesdropping

Social Engineering

Phreaking

Phishing

Pharming

What Are Common Attack Vectors?

Social Engineering Attacks

Wireless Network Attacks

Web Application Attacks

The Importance of Countermeasures

Chapter Summary

Key Concepts and Terms

Chapter 3 Assessment

CHAPTER 4 Business Drivers of Information Security

Risk Management’s Importance to the Organization

Understanding the Relationship between a BIA, a BCP, and a DRP

Business Impact Analysis (BIA)

Business Continuity Plan (BCP)

Disaster Recovery Plan (DRP)

Assessing Risks, Threats, and Vulnerabilities

Closing the Information Security Gap

Adhering to Compliance Laws

Keeping Private Data Confidential

Mobile Workers and Use of Personally Owned Devices

BYOD Concerns

Endpoint and Device Security

Chapter Summary

Key Concepts and Terms

Chapter 4 Assessment

CHAPTER 5 Networks and Telecommunications

The Open Systems Interconnection Reference Model

The Main Types of Networks

Wide Area Networks

Local Area Networks

TCP/IP and How It Works

TCP/IP Overview

IP Addressing

Common Ports

Common Protocols

Internet Control Message Protocol

Network Security Risks

Categories of Risk

Basic Network Security Defense Tools

Firewalls

Virtual Private Networks and Remote Access

Network Access Control

Voice and Video in an IP Network

Wireless Networks

Wireless Access Points

Wireless Network Security Controls

Chapter Summary

Key Concepts and Terms

Chapter 5 Assessment

CHAPTER 6 Access Controls

Four-Part Access Control

Two Types of Access Controls

Physical Access Control

Logical Access Control

Authorization Policies

Methods and Guidelines for Identification

Identification Methods

Identification Guidelines

Processes and Requirements for Authentication

Authentication Types

Single Sign-On

Policies and Procedures for Accountability

Log Files

Monitoring and Reviewing

Data Retention, Media Disposal, and Compliance Requirements

Formal Models of Access Control

Discretionary Access Control

Operating Systems–Based DAC

Mandatory Access Control

Nondiscretionary Access Control

Rule-Based Access Control

Access Control Lists

Role-Based Access Control

Content-Dependent Access Control

Constrained User Interface

Other Access Control Models

Effects of Breaches in Access Control

Threats to Access Controls

Effects of Access Control Violations

Credential and Permissions Management

Centralized and Decentralized Access Control

Types of AAA Servers

Decentralized Access Control

Privacy

Chapter Summary

Key Concepts and Terms

Chapter 6 Assessment

CHAPTER 7 Cryptography

What Is Cryptography?

Basic Cryptographic Principles

A Brief History of Cryptography

Cryptography’s Role in Information Security

Business and Security Requirements for Cryptography

Internal Security

Security in Business Relationships

Security Measures That Benefit Everyone

Cryptographic Principles, Concepts, and Terminology

Cryptographic Functions and Ciphers

Types of Ciphers

Transposition Ciphers

Substitution Ciphers

Product and Exponentiation Ciphers

Symmetric and Asymmetric Key Cryptography

Symmetric Key Ciphers

Asymmetric Key Ciphers

Cryptanalysis and Public Versus Private Keys

Keys, Keyspace, and Key Management

Cryptographic Keys and Keyspace

Key Management

Key Distribution

Key Distribution Centers

Digital Signatures and Hash Functions

Hash Functions

Digital Signatures

Cryptographic Applications and Uses in Information System Security

Other Cryptographic Tools and Resources

Symmetric Key Standards

Asymmetric Key Solutions

Hash Function and Integrity

Digital Signatures and Nonrepudiation

Principles of Certificates and Key Management

Modern Key Management Techniques

Chapter Summary

Key Concepts and Terms

Chapter 7 Assessment

CHAPTER 8 Malicious Software and Attack Vectors

Characteristics, Architecture, and Operations of Malicious Software

The Main Types of Malware

Viruses

Spam

Worms

Trojan Horses

Logic Bombs

Active Content Vulnerabilities

Malicious Add-Ons

Injection

Botnets

Denial of Service Attacks

Spyware

Adware

Phishing

Keystroke Loggers

Hoaxes and Myths

Homepage Hijacking

Webpage Defacements

A Brief History of Malicious Code Threats

1970s and Early 1980s: Academic Research and UNIX

1980s: Early PC Viruses

1990s: Early LAN Viruses

Mid-1990s: Smart Applications and the Internet

2000 to the Present

Threats to Business Organizations

Types of Threats

Internal Threats from Employees

Anatomy of an Attack

What Motivates Attackers?

The Purpose of an Attack

Types of Attacks

Phases of an Attack

Attack Prevention Tools and Techniques

Application Defenses

Operating System Defenses

Network Infrastructure Defenses

Safe Recovery Techniques and Practices

Implementing Effective Software Best Practices

Intrusion Detection Tools and Techniques

Antivirus Scanning Software

Network Monitors and Analyzers

Content/Context Filtering and Logging Software

Honeypots and Honeynets

Chapter Summary

Key Concepts and Terms

Chapter 8 Assessment

CHAPTER 9 Security Operations and Administration

Security Administration

Controlling Access

Documentation, Procedures, and Guidelines

Disaster Assessment and Recovery

Security Outsourcing

Compliance

Event Logs

Compliance Liaison

Remediation

Professional Ethics

Common Fallacies About Ethics

Codes of Ethics

Personnel Security Principles

The Infrastructure for an IT Security Policy

Policies

Standards

Procedures

Baselines

Guidelines

Data Classification Standards

Information Classification Objectives

Examples of Classification

Classification Procedures

Assurance

Configuration Management

Hardware Inventory and Configuration Chart

The Change Management Process

Change Control Management

Change Control Committees

Change Control Procedures

Change Control Issues

Application Software Security

The System Life Cycle

Testing Application Software

Software Development and Security

Software Development Models

Chapter Summary

Key Concepts and Terms

Chapter 9 Assessment

CHAPTER 10 Auditing, Testing, and Monitoring

Security Auditing and Analysis

Security Controls Address Risk

Determining What Is Acceptable

Permission Levels

Areas of Security Audits

Purpose of Audits

Customer Confidence

Defining the Audit Plan

Defining the Scope of the Plan

Auditing Benchmarks

Audit Data Collection Methods

Areas of Security Audits

Control Checks and Identity Management

Post-Audit Activities

Exit Interview

Data Analysis

Generation of Audit Report

Presentation of Findings

Security Monitoring

Security Monitoring for Computer Systems

Monitoring Issues

Logging Anomalies

Log Management

Types of Log Information to Capture

How to Verify Security Controls

Intrusion Detection System

Analysis Methods

HIDS

Layered Defense: Network Access Control

Control Checks: Intrusion Detection

Host Isolation

System Hardening

Monitoring and Testing Security Systems

Monitoring

Testing

Chapter Summary

Key Concepts and Terms

Chapter 10 Assessment

CHAPTER 11 Contingency Planning

Business Continuity Management

Emerging Threats

Static Environments

Terminology

Assessing Maximum Tolerable Downtime

Business Impact Analysis

Plan Review

Testing the Plan

Backing Up Data and Applications

Types of Backups

Incident Handling

Preparation

Identification

Notification

Response

Recovery

Follow-Up

Documentation and Reporting

Recovery from a Disaster

Activating the Disaster Recovery Plan

Operating in a Reduced/Modified Environment

Restoring Damaged Systems

Disaster Recovery Issues

Recovery Alternatives

Interim or Alternate Processing Strategies

Chapter Summary

Key Concepts and Terms

Chapter 11 Assessment

CHAPTER 12 Digital Forensics

Introduction to Digital Forensics

Understanding Digital Forensics

Knowledge That Is Needed for Forensic Analysis

Overview of Computer Crime

Types of Computer Crime

The Impact of Computer Crime on Forensics

Forensic Methods and Labs

Forensic Methodologies

Setting Up a Forensic Lab

Collecting, Seizing, and Protecting Evidence

The Importance of Proper Evidence Handling

Imaging Original Evidence

Recovering Data

Undeleting Data

Recovering Data from Damaged Media

Operating System Forensics

Internals and Storage

Command-Line Interface and Scripting

Mobile Forensics

Mobile Device Evidence

Seizing Evidence from a Mobile Device

Chapter Summary

Key Concepts and Terms

Chapter 12 Assessment

CHAPTER 13 Information Security Standards

Standards Organizations

National Institute of Standards and Technology

International Organization for Standardization

International Electrotechnical Commission

World Wide Web Consortium

Internet Engineering Task Force

Institute of Electrical and Electronics Engineers

International Telecommunication Union Telecommunication Sector

American National Standards Institute

European Telecommunications Standards Institute Cyber Security Technical Committee

ISO 17799 (Withdrawn)

ISO/IEC 27002

Payment Card Industry Data Security Standard

Chapter Summary

Key Concepts and Terms

Chapter 13 Assessment

CHAPTER 14 Information Security Certifications

U.S. Department of Defense/Military Directive 8570.01

U.S. DoD/Military Directive 8140

U.S. DoD Training Framework

Vendor-Neutral Professional Certifications

International Information Systems Security Certification Consortium, Inc.

Global Information Assurance Certification/SANS Institute

Certified Internet Web Professional

CompTIA

ISACA®

Other Information Systems Security Certifications

Vendor-Specific Professional Certifications

Cisco Systems

Juniper Networks

RSA

Symantec

Check Point

Chapter Summary

Key Concepts and Terms

Chapter 14 Assessment

CHAPTER 15 Compliance Laws

Compliance Is the Law

Federal Information Security

The Federal Information Security Management Act of 2002

The Federal Information Security Modernization Act of 2014

The Role of the National Institute of Standards and Technology

National Security Systems

The Health Insurance Portability and Accountability Act (HIPAA)

Purpose and Scope

Main Requirements of the HIPAA Privacy Rule

Main Requirements of the HIPAA Security Rule

Oversight

Omnibus Regulations

The Gramm-Leach-Bliley Act

Purpose and Scope

Main Requirements of the GLBA Privacy Rule

Main Requirements of the GLBA Safeguards Rule

Oversight

The Sarbanes-Oxley Act

Purpose and Scope

SOX Control Certification Requirements

SOX Records Retention Requirements

Oversight

The Family Educational Rights and Privacy Act

Purpose and Scope

Main Requirements

Oversight

The Children’s Online Privacy Protection Act of 1998

The Children’s Internet Protection Act

Purpose and Scope

Main Requirements

Oversight

Payment Card Industry Data Security Standard

Purpose and Scope

Self-Assessment Questionnaire

General Data Protection Regulation

California Consumer Privacy Act

Making Sense of Laws for Information Security Compliance

Chapter Summary

Key Concepts and Terms

Chapter 15 Assessment

APPENDIX A Answer Key

APPENDIX B Standard Acronyms

APPENDIX C Earning the CompTIA Security+ Certification

Glossary of Key Terms

References

Index

David Kim is the president of Security Evolutions, Inc. (SEI; www.security-evolutions.com), located outside the Washington, DC, metropolitan area. SEI provides governance, risk, and compliance consulting services for public and private sector clients globally. SEI’s clients include healthcare institutions, banking institutions, governments, and international airports. SEI’s IT security consulting services include security risk assessments, vulnerability assessments, compliance audits, and designing of layered security solutions for enterprises. In addition, available services include developing business continuity and disaster recovery plans. Mr. Kim’s IT and IT security experience encompasses more than 30+ years of technical engineering, technical management, and sales and marketing management. This experience includes LAN/WAN, internetworking, enterprise network management, and IT security for voice, video, and data networking infrastructures. He is an accomplished author and part-time adjunct professor who enjoys teaching cybersecurity to students across the United States.

Michael G. Solomon, PhD, CISSP, PMP, CISM, CySA+, Pentest+, is an author, educator, and consultant focusing on privacy, security, blockchain, and identity management. As an IT professional and consultant since 1987, Dr. Solomon has led project teams for many Fortune 500 companies and has authored and contributed to more than 30 books and numerous training courses. Dr. Solomon is a Professor of Computer and Information Sciences at the University of the Cumberlands and holds a Ph.D. in Computer Science and Informatics from Emory University.

What makes us different?

• Instant Download

• Always Competitive Pricing

• 100% Privacy

• FREE Sample Available

• 24-7 LIVE Customer Support

Delivery Info

Reviews (0)

Reviews

There are no reviews yet.

Be the first to review “Fundamentals of Information Systems Security 4th Edition by David Kim, ISBN-13: 978-1284220735”

Your email address will not be published. Required fields are marked *