Higher Education

Roadmap to Information Security: For IT and Infosec Managers, 1st Edition

  • Michael E. Whitman Michael J. Coles College of Business, Kennesaw State University
  • Herbert J. Mattord Michael J. Coles College of Business, Kennesaw State University
  • ISBN-10: 1435480309  |  ISBN-13: 9781435480308
  • 400 Pages
  • © 2011 | Published
  • College Bookstore Wholesale Price = $41.50
  *Why an online review copy?
  • It's the greener, leaner way to review! An online copy cuts down on paper and on time. Reduce the wait (and the weight) of printed texts. Your online copy arrives instantly, and you can review it anytime from your computer or favorite mobile device.

If you prefer a print copy to review, please contact your representative.

About

Overview

ROADMAP TO INFORMATION SECURITY: FOR IT AND INFOSEC MANAGERS provides a solid overview of information security and its relationship to the information needs of an organization. Content is tailored to the unique needs of information systems professionals who find themselves brought in to the intricacies of information security responsibilities. The book is written for a wide variety of audiences looking to step up to emerging security challenges, ranging from students to experienced professionals. This book is designed to guide the information technology manager in dealing with the challenges associated with the security aspects of their role, providing concise guidance on assessing and improving an organization's security. The content helps IT managers to handle an assignment to an information security role in ways that conform to expectations and requirements, while supporting the goals of the manager in building and maintaining a solid information security program.

Features and Benefits

  • THE INFORMATION SECURITY MANAGER'S JOURNAL: Each chapter opens with an ongoing narrative written in the first person, providing insight into the challenges information systems professionals face when placed into the role of an information security manager.
  • REFLECTION POINTS: Journal entries conclude with a set of open-ended questions that complete the scenario and give the reader a chance to further ponder the issues under discussion.
  • TECHNICAL AND MANAGERIAL DETAILS BOXES: Interspersed throughout the book, these sections highlight interesting topics and detailed technical issues, giving the reader the option of delving into selected topics more deeply.
  • HANDS-ON ASSESSMENT CHECKLISTS: Program assessment questions offer users the opportunity to compare their programs against national and international information security standards, such as ISO 27001 and NIST SP 800 series.
  • SECURITY PROFESSIONAL CERTIFICATION MAP: A map of the CISSP and CISM certification domains into the chapters and sections of the book will facilitate review and study for those seeking certification.
  • INCLUDES FOREWORD WRITTEN BY RESPECTED INDUSTRY PIONEER DONN B. PARKER

Table of Contents

Part I: OVERVIEW OF THE SECURITY LANDSCAPE.
1. Introduction to the Roadmap to Information Security Roadmap.
2. Threats to Information Assets.
3. Attacks on Information Assets.
Part II: STRATEGIC INFORMATION SECURITY: SECURITY GOVERNANCE.
4. Information Technology and Information Security Governance.
5. Information Security Roles and Responsibilities.
6. Positioning the Information Security Function.
7. Conducting an Information Security Assessment.
Part III: STRATEGIC INFORMATION SECURITY: RISK MANAGEMENT.
8. Risk Management: Risk Identification.
9. Risk Management: Risk Assessment.
10. Risk Management: Risk Control.
11. Alternate Approaches to Risk Management.
PART IV: STRATEGIC INFORMATION SECURITY: STANDARDS, REGULATIONS, LAW AND ETHICS.
12. Standards for Managing the Information Security Program.
13. Emerging Trends in Certification and Accreditation.
14. Dealing with Regulatory Compliance and Key Legal Issues.
15. Other Important Laws for Every IT/Security Manager.
16. Ethics in IT and Information Security.
Part V: TACTICAL INFORMATION SECURITY: POLICIES AND PROGRAMS.
17. Information Security Policy: Development and Implementation.
18. Information Security Policy Types: EISP, ISSP, SysSP.
19. Employment Policies and Practices.
20. Implementing Security Education, Training, and Awareness Programs.
Part VI: TACTICAL INFORMATION SECURITY: CONTINGENCY PLANNING.
21. Contingency Planning: Planning for the Worst.
22. The Incident Response Plan.
23. The Disaster Recovery Plan.
24. The Business Continuity Plan.
Part VII: OPERATIONAL INFORMATION SECURITY: NETWORK SECURITY.
25. Communications and Operations Management.
26. Firewalls.
27. Protecting Remote Access.
28. Intrusion Detection Systems.
29. Scanning and Analysis Tools.
Part VIII: OPERATIONAL INFORMATION SECURITY: CRYPTOGRAPHY AND ACCESS CONTROLS.
30. Cryptography in Theory.
31. Cryptography in Practice.
32. Access Controls and Biometrics.
33. Physical Security.
Part IX: SUPPLEMENTAL MATERIALS.
Appendix A: Information Security Self-Assessment Checklists.
Appendix B: Information Security Certification Guidelines – The CISSP/SSCP.
Appendix C: Information Security Certification Guidelines – The CISM.

Meet the Author

Author Bio

Michael E. Whitman

Michael Whitman, Ph.D., CISM, CISSP, is Professor of Information Security at Kennesaw State University, Kennesaw, Georgia. He also serves as the Executive Director of the Center for Information Security Education, Coles College of Business. In 2004, 2007, 2012 and 2015, under his direction the Center for Information Security Education spearheaded KSU’s successful bid for the prestigious National Center of Academic Excellence recognitions (CAE/IAE and CAE IA/CDE), awarded jointly by the Department of Homeland Security and the National Security Agency. Dr. Whitman is also the Editor-in-Chief of the Journal of Cybersecurity Education, Research and Practice, and is Director of the Southeast Collegiate Cyber Defense Competition. Dr. Whitman is an active researcher and author in Information Security Policy, Threats, Curriculum Development, and Ethical Computing. He currently teaches graduate and undergraduate courses in Information Security. Dr. Whitman has several information security textbooks currently in print, including PRINCIPLES OF INFORMATION SECURITY; MANAGEMENT OF INFORMATION SECURITY; READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, VOLUMES I AND II; THE HANDS-ON INFORMATION SECURITY LAB MANUAL; PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY; and THE GUIDE TO NETWORK SECURITY AND THE GUIDE TO FIREWALLS AND NETWORK SECURITY. He has published articles in Information Systems Research, the Communications of the ACM, the Journal of International Business Studies, Information and Management, and the Journal of Computer Information Systems. Dr. Whitman is a member of the Association for Computing Machinery, the Information Systems Security Association, ISACA and the Association for Information Systems. Previously, Dr. Whitman served the U.S. Army as an Automated Data Processing System Security Officer (ADPSSO).

Herbert J. Mattord

Herbert Mattord, Ph.D., CISM, CISSP, completed 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University, where he is Assistant Chair of the Department of Information Systems and Associate Professor of Information Security and Assurance program. Dr. Mattord currently teaches graduate and undergraduate courses in Information Security and Assurance as well as Information Systems. He and Michael Whitman have authored PRINCIPLES OF INFORMATION SECURITY, MANAGEMENT OF INFORMATION SECURITY, READINGS AND CASES IN THE MANAGEMENT OF INFORMATION SECURITY, PRINCIPLES OF INCIDENT RESPONSE AND DISASTER RECOVERY, THE GUIDE TO NETWORK SECURITY, and THE HANDS-ON INFORMATION SECURITY LAB MANUAL, Dr. Mattord is an active researcher, author, and consultant in Information Security Management and related topics. He has published articles in the Information Resources Management Journal, Journal of Information Security Education, the Journal of Executive Education, and the International Journal of Interdisciplinary Telecommunications and Networking. Dr. Mattord is a member of the Information Systems Security Association, ISACA, and the Association for Information Systems. During his career as an IT practitioner, Dr. Mattord was an adjunct professor at Kennesaw State University, Southern Polytechnic State University in Marietta, Georgia, Austin Community College in Austin, Texas, and Texas State University: San Marcos. He was formerly the Manager of Corporate Information Technology Security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge found in this and his other textbooks.