Cengage Learning

Higher Education

Management of Information Security, 3rd Edition

  • Michael E. Whitman - Ph. D., CISM, CISSP Michael J. Coles College of Business, Kennesaw State University
  • Herbert J. Mattord - MBA, CISM, CISSP Michael J. Coles College of Business, Kennesaw State University
  • ISBN-10: 1435488849  |  ISBN-13: 9781435488847
  • 592 Pages
  • Previous Editions: 2008, 2004
  • © 2011 | Published
  • Newer Edition Available
Request a Copy

About

Overview

Management of Information Security, Third Edition focuses on the managerial aspects of information security and assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. This new edition includes up-to-date information on changes in the field such as revised sections on national and international laws and international standards like the ISO 27000 series. With these updates, Management of Information Security continues to offer a unique overview of information security from a management perspective while maintaining a finger on the pulse of industry changes and academic relevance.

Features and Benefits

  • Reflects changes in the field, including revised sections on national and international laws and international standards such as the ISO 27000 series.
  • Expanded coverage in key managerial areas of Information Security Governance, Access Control Models, and Information Security Program Assessment and Metrics.
  • Applies a running case study which follows a fictional company as it encounters various information security issues, rounded out by discussion questions that encourage class participation.
  • Offers "Viewpoint" essays to provide a range of commentary that illustrate interesting topics or share personal experiences--providing students with real-world examples.
  • Reinforces skills as they are learned with extensively revised review questions, hands-on activities, and case projects in each chapter.

Table of Contents

Unit I: INTRODUCTION.
1: Introduction to Management of Information Security.
UNIT II: PLANNING.
2: Planning for Security.
3: Planning for Contingencies.
UNIT III: POLICY AND PROGRAMS.
4: Security Policy.
5: Developing Security Programs.
6: Security Management Models.
7: Security Management Practices.
UNIT IV: PROTECTION.
8: Risk Assessment.
9: Controlling Risk.
10: Protection Mechanisms.
UNIT V: PEOPLE.
11: Personnel and Security.
12: Law and Ethics.
Appendix A : NIST SP 800-26, Security Self-Assessment Guide for Information.
Technology Systems and ISO 27002 Questionnaire.
Appendix B : Risk Management Models.

What's New

  • Reflects changes in the field, including revised sections on national and international laws and international standards like the ISO 27000 series.
  • Additional coverage in key managerial areas of Information Security Governance, Access Control Models, and Information Security Program Assessment and Metrics.
  • Former Chapter 12, Project Management, has been merged into Chapter 1 – providing all introductory and general IT managerial material in the opening chapter.
  • Chapter 6, Security Management Models and Practices, has been split into two chapters and enhanced with more practices and models, consolidating and enhancing coverage of security management materials.

Learning Resource Bundles

Choose the textbook packaged with the resources that best meet your course and student needs. Contact your Learning Consultant for more information.

Bundle: Text + Lab Manual

ISBN-10: 1111203245  | ISBN-13: 9781111203245


Bundle: Text + Readings & Cases in Information Security: Law & Ethics

ISBN-10:  1111203237  | ISBN-13:  9781111203238


Bundle: Text + Readings and Cases in the Management of Information Security

ISBN-10:  1111203199  | ISBN-13:  9781111203191


ISBN-10:  1133069916 | ISBN-13:  9781133069911


Supplements

All supplements have been updated in coordination with the main title. Select the main title's "About" tab, then select "What's New" for updates specific to title's edition.

For more information about these supplements, or to obtain them, contact your Learning Consultant.

Instructor Supplements

Cengage Learning eBook Instant Access Code  (ISBN-10: 1111312915 | ISBN-13: 9781111312916)

Instructor Resource CD-ROM  (ISBN-10: 1435488830 | ISBN-13: 9781435488830)

The following supplemental materials are available when this book is used in a classroom setting. All the instructor supplements available with this book are provided to instructors on a single CD, called the Instructor’s Resource CD (ISBN 1-4354-8883-0), or available online via the Instructor’s Resource Site accessed via the book’s product page on www.cengage.com. Electronic Instructor’s Manual--The Instructor’s Manual includes suggestions and strategies for using this text, such as advice for lecture topics. It also includes answers to the review questions and suggested solutions to the exercises at the end of each chapter. PowerPoint presentations--This book comes with Microsoft PowerPoint slides for each chapter. They’re included as a teaching aid for classroom presentation, to make available to students on the network for chapter review, or to be printed for classroom distribution. Instructors, please feel free to add your own slides for additional topics you introduce to the class. Figure files--Figure files allow instructors to create their own presentations using figures taken from the text. ExamView®--ExamView®, the ultimate tool for objective-based testing needs, is a powerful test generator that enables instructors to create paper, LAN, or Web-based tests from test banks designed specifically for their Cengage Course Technology text. Instructors can utilize the ultra-efficient QuickTest Wizard to create tests in less than five minutes by taking advantage of Cengage Course Technology’s questions banks, or customize their own exams from scratch.

Readings and Cases in the Management of Information Security  (ISBN-10: 0619216271 | ISBN-13: 9780619216276)

These readings provide students with a depth of content and analytical perspective not found in other textbooks. Organized into five units, Planning, Policy, People, Projects and Protection, each unit includes items such as academic research papers, summaries of industry practices or written cases to give students valuable resources to use as industry professionals.

Readings & Cases in Information Security: Law & Ethics  (ISBN-10: 1435441575 | ISBN-13: 9781435441576)

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text, this resource offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.

Hands-On Information Security Lab Manual  (ISBN-10: 061921631X | ISBN-13: 9780619216313)

The Hands-On Information Security Lab Manual, Second Edition allows students to apply the basics of their introductory security knowledge in a hands-on environment with detailed exercises using Windows 2000, XP and Linux. This non-certification based lab manual includes coverage of scanning, OS vulnerability analysis and resolution firewalls, security maintenance, forensics, and more. A full version of the software needed to complete these projects is included on a CD with every text, so instructors can effortlessly set up and run labs to correspond with their classes. The Hands-On Information Security Lab Manual, Second Edition is a suitable resource for introductory, technical and managerial courses, and is the perfect accompaniment to Principles of Information Security, Second Edition and Management of Information Security.

Student Supplements

Cengage Learning eBook Instant Access Code  (ISBN-10: 1111312915 | ISBN-13: 9781111312916)

Readings and Cases in the Management of Information Security  (ISBN-10: 0619216271 | ISBN-13: 9780619216276)

This text provides students with a set of industry focused readings and cases illustrating real-world issues in information security.

Readings & Cases in Information Security: Law & Ethics  (ISBN-10: 1435441575 | ISBN-13: 9781435441576)

Readings and Cases in Information Security: Law and Ethics provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.

Hands-On Information Security Lab Manual  (ISBN-10: 061921631X | ISBN-13: 9780619216313)

This lab manual allows students to get hands-on application experience on topics ranging from firewalls and forensics to scanning and operating system vulnerability.

Meet the Author

Author Bio

Michael E. Whitman - Ph. D., CISM, CISSP

Michael Whitman, Ph.D., CISM, CISSP is a Professor of Information Security at Kennesaw State University, Kennesaw, Georgia, where he is also the Executive Director of the KSU/Coles College of Business Center for Information Security Education. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU’s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CD) awarded by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Information Security Education Journal, and Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, and Curriculum Development, as well as Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print – Principles of Information Security, 5th Ed., Management of Information Security, 5th Ed., Readings and Cases in the Management of Information Security, Volumes I and II, The Hands-On Information Security Lab Manual, 4th Ed., Principles of Incident Response and Disaster Recovery, 2nd Ed., The Guide to Network Security and The Guide to Firewalls and Network Security, 3rd Ed. all from Cengage Learning. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Prior to coming to academia, Dr. Whitman was an officer in the U.S. Army, where he had the responsibilities of ADPSSO (Automated Data Processing System Security Officer).

Herbert J. Mattord - MBA, CISM, CISSP

Herbert Mattord, Ph.D., CISM, CISSP completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security & Assurance as well as Information Systems. He and Michael Whitman are the authors of Principles of Information Security, 5th Ed, Management of Information Security, 5th Ed, Readings and Cases in the Management of Information Security, Principles of Incident Response and Disaster Recovery, 2nd Ed, The Guide to Network Security, and The Hands-On Information Security Lab Manual, 4th Ed all from Cengage Learning. Dr. Mattord is an active researcher and author in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where much of the practical knowledge found in this and other textbooks was acquired.