| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9911009250903321 |
|
|
Autore |
Ahmed Waqas |
|
|
Titolo |
Information Security and CCP Scheme |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Burlington : , : Toronto Academic Press, , 2024 |
|
©2024 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
|
|
Edizione |
[1st ed.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (251 pages) |
|
|
|
|
|
|
Soggetti |
|
Computer security |
Information technology |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Nota di contenuto |
|
Cover -- Title Page -- Copyright -- About The Editor -- Contents -- List of Figures -- List of Tables -- List of Abbreviations -- Preface -- Chapter 1: Introduction To Information Security -- Unit Introduction -- 1.1. History Of Information Security -- 1.2. What Is Security? -- 1.3. Key Information Security Concepts -- 1.4. Critical Characteristics Of Information -- 1.5. Cnss Security Model -- 1.6. Components Of An Information System -- 1.7. Balancing Information Security And Access -- 1.8. Approaches To Information Security Implementation -- 1.9. The Systems Development Life Cycle -- 1.10. The Security Systems Development Life Cycle -- 1.11. Security Professionals And The Organization -- 1.12. Senior Management -- 1.13. Information Security Project Team -- 1.14. Data Responsibilities -- Summary -- Review Questions -- Multiple Choice Questions -- References -- Chapter 2: The Human Resources Of It Project Management |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book provides a comprehensive overview of the Common Criteria for Information Technology Security Evaluation (CC), an international standard for assessing the security of IT products and systems. It covers the history, development, and evaluation process of the CC scheme, along with its practical applications across various domains. Aimed at students, researchers, and IT professionals, the book includes case studies and real-world examples to illustrate the scheme's role in |
|
|
|
|
|
|
|
|
|
|
information security. Edited by Waqas Ahmed, a cybersecurity expert, it serves as a valuable resource for understanding how to ensure the integrity, confidentiality, and availability of information within organizations. |
|
|
|
|
|
| |