03011nam 22004813 450 991100925090332120240726080302.097817795619851779561989(CKB)32713032900041(MiAaPQ)EBC31545579(Au-PeEL)EBL31545579(Exl-AI)31545579(OCoLC)1450100208(Perlego)4501032(EXLCZ)993271303290004120240726d2024 uy 0engur|||||||||||txtrdacontentcrdamediacrrdacarrierInformation Security and CCP Scheme1st ed.Burlington :Toronto Academic Press,2024.©2024.1 online resource (251 pages)9781774697856 1774697858 Cover -- Title Page -- Copyright -- About The Editor -- Contents -- List of Figures -- List of Tables -- List of Abbreviations -- Preface -- Chapter 1: Introduction To Information Security -- Unit Introduction -- 1.1. History Of Information Security -- 1.2. What Is Security? -- 1.3. Key Information Security Concepts -- 1.4. Critical Characteristics Of Information -- 1.5. Cnss Security Model -- 1.6. Components Of An Information System -- 1.7. Balancing Information Security And Access -- 1.8. Approaches To Information Security Implementation -- 1.9. The Systems Development Life Cycle -- 1.10. The Security Systems Development Life Cycle -- 1.11. Security Professionals And The Organization -- 1.12. Senior Management -- 1.13. Information Security Project Team -- 1.14. Data Responsibilities -- Summary -- Review Questions -- Multiple Choice Questions -- References -- Chapter 2: The Human Resources Of It Project ManagementGenerated by AI.This book provides a comprehensive overview of the Common Criteria for Information Technology Security Evaluation (CC), an international standard for assessing the security of IT products and systems. It covers the history, development, and evaluation process of the CC scheme, along with its practical applications across various domains. Aimed at students, researchers, and IT professionals, the book includes case studies and real-world examples to illustrate the scheme's role in information security. Edited by Waqas Ahmed, a cybersecurity expert, it serves as a valuable resource for understanding how to ensure the integrity, confidentiality, and availability of information within organizations.Generated by AI.Computer securityGenerated by AIInformation technologyGenerated by AIComputer securityInformation technologyAhmed Waqas1794215MiAaPQMiAaPQMiAaPQBOOK9911009250903321Information Security and CCP Scheme4396119UNINA