Contents to look for in an information security management handbook

An information security management handbook has many domain covered in it. Moreover it is also useful for the persons who are attending the certification examination on security management. The book is structured in such a way that is easy to access the required content faster. It is always better to look for the latest edition of the book since it contains many updated information on the field.



The domains that are covered in an information security management handbook are access control, communications security, risk management, business continuity planning, policies and standards. Some of the other domain other than these includes computer architecture and system security, law, investigation and ethics, application program security, cryptography, operations security, and physical security.

In the access control domain coverage, the topics include the principles and the objectives of the access control and the type of security controls along with the purpose of security management. The issues pertaining to access control are also covered that include biometric identification. In communication security, the objective, threats and countermeasures are dealt with. A topic on self-hack audit is also available. The security model for the networks and the internet would be useful and subsequently internet security management with internet firewalls is also dealt with.

Risk Management domain includes topics such as risk analysis, assessment of risk in different environments such as distributed environments and the impact of those risks on the business. Policies, standards and organization deserve a separate domain. Topics on policy development, organization architecture, and model for IP practitioners are helpful. A topic on enterprise security architecture would be apt in this domain.

Computer architecture and system security chapter includes topics on microcomputer and LAN security and systems architecture. Chapter on Law and Investigation include topics on abuse methods for computer and how to detect them. The state and federal laws pertaining to computer crimes are also dealt with this chapter.

These are some of the chapters that a user might expect in an information security management handbook. Other topics of importance are added periodically in successive editions and hence it is useful to update your editions of handbook.

 

 


 

 

 

 

 

 


Topics

  • Management - Home
  • Asset Management

  • Brand Management
  • Business Process Management

  • Change Management

  • Data Management

  • Database Management

  • Debt Management

  • Document Management
  • Facility Management

  • Information Management

  • Inventory Management

  • Medical Management Software
  • Network Management

  • Performance Management

  • Portfolio Management

  • Project Management

  • Property Management Software
  • Quality Management

  • Risk Management

  • Sales Management

  • Security Management

  • Technology Management

  • Time Management

  • Warehouse Management
  •  


    FREE Subscription

    Stay Current With the Latest Trends & Developments Realted to Management. Signup for Our Newsletter and
    Receive New Articles Through Email.

    Name:

    Email:

    Note : We never rent, trade, or sell our email lists to anyone. We assure that your privacy is respected and protected.

     

    Copyright - © 2005 - 2017 - www.management-hub.com

    | Management-Hub.com Privacy Policy | Disclosure | Disclaimer | Contact |