1.

Record Nr.

UNINA9911009250903321

Autore

Ahmed Waqas

Titolo

Information Security and CCP Scheme

Pubbl/distr/stampa

Burlington : , : Toronto Academic Press, , 2024

©2024

ISBN

9781779561985

1779561989

Edizione

[1st ed.]

Descrizione fisica

1 online resource (251 pages)

Soggetti

Computer security

Information technology

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Nota di contenuto

Cover -- Title Page -- Copyright -- About The Editor -- Contents -- List of Figures -- List of Tables -- List of Abbreviations -- Preface -- Chapter 1:  Introduction To Information Security --   Unit Introduction --   1.1. History Of Information Security --   1.2. What Is Security? --   1.3. Key Information Security Concepts --   1.4. Critical Characteristics Of Information --   1.5. Cnss Security Model --   1.6. Components Of An Information System --   1.7. Balancing Information Security And Access --   1.8. Approaches To Information Security Implementation --   1.9. The Systems Development Life Cycle --   1.10. The Security Systems Development Life Cycle --   1.11. Security Professionals And The Organization --   1.12. Senior Management --   1.13. Information Security Project Team --   1.14. Data Responsibilities --   Summary --   Review Questions --   Multiple Choice Questions --   References -- Chapter 2:  The Human Resources Of It Project Management

Sommario/riassunto

This book provides a comprehensive overview of the Common Criteria for Information Technology Security Evaluation (CC), an international standard for assessing the security of IT products and systems. It covers the history, development, and evaluation process of the CC scheme, along with its practical applications across various domains. Aimed at students, researchers, and IT professionals, the book includes case studies and real-world examples to illustrate the scheme's role in



information security. Edited by Waqas Ahmed, a cybersecurity expert, it serves as a valuable resource for understanding how to ensure the integrity, confidentiality, and availability of information within organizations.