LEADER 04621oam 2200709I 450 001 9910781524603321 005 20200520144314.0 010 $a0-367-38181-8 010 $a0-429-09346-2 010 $a1-4665-5141-0 010 $a1-283-59642-3 010 $a9786613908872 010 $a1-4398-0983-6 024 7 $a10.1201/b11355 035 $a(CKB)2550000000074818 035 $a(EBL)826927 035 $a(OCoLC)804664120 035 $a(SSID)ssj0000550949 035 $a(PQKBManifestationID)11408572 035 $a(PQKBTitleCode)TC0000550949 035 $a(PQKBWorkID)10509477 035 $a(PQKB)10778335 035 $a(Au-PeEL)EBL826927 035 $a(CaPaEBR)ebr10517994 035 $a(CaONFJC)MIL390887 035 $a(OCoLC)860576292 035 $a(OCoLC)773317062 035 $a(CaSebORM)9781439809839 035 $a(MiAaPQ)EBC826927 035 $a(EXLCZ)992550000000074818 100 $a20180331d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aAsset protection through security awareness /$fTyler Justin Speed 205 $a1st edition 210 1$aBoca Raton, Fla. :$cCRC Press,$d2012. 215 $a1 online resource (520 p.) 300 $aAn Auerbach book. 311 $a1-4665-3276-9 311 $a1-4398-0982-8 327 $aCover; Title Page; Copyright; Contents; INTRODUCTION; WHAT IS INFORMATION SECURITY?; CHAPTER 1: CREATING A CULTURE OF SECURITY AWARENESS; CHAPTER 2: OVERVIEW OF SECURITY AWARENESS CATEGORIES; CHAPTER 3: WHO IS AN IS PROFESSIONAL?; CHAPTER 4: DIPLOMACY; CHAPTER 5: PRIVACY CONCERNS; CHAPTER 6: INTERDEPARTMENTAL SECURITY; CHAPTER 7: RISK MANAGEMENT; CHAPTER 8: SOCIAL ENGINEERING; CHAPTER 9: INCIDENT DETECTION AND RESPONSE; CHAPTER 10: PHYSICAL SECURITY; CHAPTER 11: PCI COMPLIANCE; CHAPTER 12: BUSINESS CONTINUITY PLANNING; CHAPTER 13: USER AUTHENTICATION METHODS 327 $aCHAPTER 14: COMPUTER AND NETWORK FORENSICSCHAPTER 15: MALWARE; CHAPTER 16: CRAFTING A SECURITY POLICY; CHAPTER 17: PERFORMING SECURITY ANALYSES AND AUDITS; CHAPTER 18: ACCESS CONTROL; CHAPTER 19: SECURITY CHECKLISTS; INDEX; ABOUT THE AUTHOR 330 $aSupplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks. It reviews key topics surrounding computer security--including privacy, access controls, and risk management--to help you fill the gaps that might exist between management and the technicians securing your network systems. Requiring no previous networking or programming experience, the book delivers a practical approach to asset protection. It specifies the roles of managers and employees in creating a company-wide culture of security awareness and provides step-by-step instruction on how to build an effective security awareness team. Each chapter examines a separate security issue and provides a brief overview of how to address that issue. This book includes helpful tools and checklists to help you address: - Visual, digital, and auditory data security - Payment card industry (PCI) compliance, password management, and social engineering - User authentication methods - Computer and network forensics - Physical security and continuity planning - Privacy concerns and privacy-related regulation This concise security management primer facilitates the up-to-date understanding required to protect your digital and physical assets, including customer data, networking equipment, and employee information. Providing you with powerful tools of diplomacy, this text will help you win the support of your employees and empower them to be effective gatekeepers of your company's most valued assets and trade secrets. --$cProvided by publisher. 606 $aComputer networks$xSecurity measures 606 $aInformation technology$xSecurity measures 606 $aBusiness enterprises$xSecurity measures 615 0$aComputer networks$xSecurity measures. 615 0$aInformation technology$xSecurity measures. 615 0$aBusiness enterprises$xSecurity measures. 676 $a658.4/78 686 $aBUS073000$aCOM032000$aCOM053000$2bisacsh 700 $aSpeed$b Tyler Justin.$01559844 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910781524603321 996 $aAsset protection through security awareness$93825379 997 $aUNINA