Amazon cover image
Image from Amazon.com

Information technology security fundamentals / Glen Sagers, Bryan Hosack.

By: Contributor(s): Material type: TextTextSeries: Information systems collectionPublisher: New York, New York (222 East 46th Street, New York, NY 10017) : Business Expert Press, [(c)2016.]Edition: First editionDescription: 1 online resource (xiv, 157 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781606499177
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleLOC classification:
  • QA76.9.A25
Online resources: Available additional physical forms:
Contents:
1. Security and information assurance -- 2. Operating system security -- 3. Data security: protecting your information -- 4. Keeping the electronic highways safe -- 5. We released what?!? (application security) -- 6. Cracking the code (cryptography) -- 7. Danger! danger! danger! (penetration testing) -- 8. Disaster recovery -- 9. Integrating your security plan across the enterprise -- 10. Conclusion -- Glossary -- Appendix A -- Endnotes -- Index.
Abstract: Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that increase security, and some that do not do as well, but overall, the best defense is to create a culture of security in the organization. Such a culture makes each member ask themselves what security implications an action will have. The culture extends from someone at reception deciding to whether to admit a visitor to upper management determining whether a strategic alliance with another firm which links their corporate information systems. The same principles that guide IT security in the enterprise guide smaller organizations and individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn on a firewall, and have antivirus software. Personal information should be safeguarded by individuals, and by the firms entrusted with it. As organizations and people develop security plans, and put the technical pieces in place, a system can emerge that is greater than the sum of its parts. Improving computing security really means education, whether of oneself, one's employees, or one's family. Thinking "security first" may seem paranoid, but in today's world, experience shows that it reflects reality.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number URL Status Date due Barcode
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library ONLINE QA76.9.A25 (Browse shelf(Opens below)) Link to resource Available BEP11102290
Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) Online Book (LOGIN USING YOUR MY CIU LOGIN AND PASSWORD) G. Allen Fleece Library Non-fiction QA76.9.A25 (Browse shelf(Opens below)) Available 11102290

1. Security and information assurance -- 2. Operating system security -- 3. Data security: protecting your information -- 4. Keeping the electronic highways safe -- 5. We released what?!? (application security) -- 6. Cracking the code (cryptography) -- 7. Danger! danger! danger! (penetration testing) -- 8. Disaster recovery -- 9. Integrating your security plan across the enterprise -- 10. Conclusion -- Glossary -- Appendix A -- Endnotes -- Index.

Access restricted to authorized users and institutions.

Information security is at the forefront of timely IT topics, due to the spectacular and well-publicized breaches of personal information stored by companies. To create a secure IT environment, many steps must be taken, but not all steps are created equal. There are technological measures that increase security, and some that do not do as well, but overall, the best defense is to create a culture of security in the organization. Such a culture makes each member ask themselves what security implications an action will have. The culture extends from someone at reception deciding to whether to admit a visitor to upper management determining whether a strategic alliance with another firm which links their corporate information systems. The same principles that guide IT security in the enterprise guide smaller organizations and individuals. The individual techniques and tools may vary by size, but everyone with a computer needs to turn on a firewall, and have antivirus software. Personal information should be safeguarded by individuals, and by the firms entrusted with it. As organizations and people develop security plans, and put the technical pieces in place, a system can emerge that is greater than the sum of its parts. Improving computing security really means education, whether of oneself, one's employees, or one's family. Thinking "security first" may seem paranoid, but in today's world, experience shows that it reflects reality.

COPYRIGHT NOT covered - Click this link to request copyright permission:

https://lib.ciu.edu/copyright-request-form

Mode of access: World Wide Web.

System requirements: Adobe Acrobat reader.

Title from PDF title page (viewed on November 25, 2015).

There are no comments on this title.

to post a comment.