The Basics of Information Security,
Edition 1 Understanding the Fundamentals of InfoSec in Theory and Practice
By Jason Andress

Publication Date: 10 Jun 2011
Description

The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use.

The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom.

This book is an ideal reference for security consultants, IT managers, students, and those new to the InfoSec field.

Key Features

  • Learn about information security without wading through huge manuals
  • Covers both theoretical and practical aspects of information security
  • Gives a broad view of the information security field for practitioners, students, and enthusiasts
About the author
By Jason Andress, Jason Andress (ISSAP, CISSP, GPEN, CEH) is a security professional with a depth of experience in both the academic and business worlds.
Table of Contents

Chapter 1. What is Information Security?
What is Security?
Models for Discussing Security Issues
Confidentiality, Integrity, and Availability
Attacks
Defense in Depth
Chapter 2.  Identification and Authentication
Identification
Authentication
Chapter 3. Authorization and Access control
Authorization
Access Control
Access Control Methodologies
Chapter 4. Auditing and Accountability
Accountability
Auditing
Chapter 5. Cryptography
History
Modern Cryptographic Tools
Protecting Data at Rest, in Motion, and in Use
Chapter 6. Operations security
Origins of Operations Security
The Operations Security Process
Laws of Operations Security
Operations Security in our Personal Lives
Chapter 7. Physical security
Physical Security Measures
Protecting People
Protecting Data
Protecting Equipment
Chapter 8. Network security
Protecting Network Borders
Protecting Network Traffic
Network Security Tools
Chapter 9. Operating System security
Operating System Hardening
Anti-Malware Tools
Software Firewalls and Host Intrusion Detection
Operating System Security Tools
Chapter 10. Application security
Software Vulnerabilities
Web Security
Database Security
Application Security Tools

Book details
ISBN: 9781597496537
Page Count: 208
Illustrations : 35 illustrations
Retail Price : £20.99

CISSP for Dummies 2e, 9780470124260, $39.99, WILEY, Mar 2007 Bookscan: 6,912

CISSP for Dummies 3e, 9780470537916, $39.99, Wiley, Dec 2009 Bookscan: 4,066

Penetration Testers’ Open Source Toolkit, $59.95, 9781597492133, Syngress, Nov 2007 Bookscan: 2,639

Audience

Security Consultants, IT Managers, Students, Those new to the InfoSec field