Browse Results

Showing 26,551 through 26,575 of 55,810 results

Information Security Policies, Procedures, and Standards: A Practitioner's Reference

by Douglas J. Landoll

Information Security Policies, Procedures, and Standards: A Practitioner's Reference gives you a blueprint on how to develop effective information security policies and procedures. It uses standards such as NIST 800-53, ISO 27001, and COBIT, and regulations such as HIPAA and PCI DSS as the foundation for the content. Highlighting key terminology, policy development concepts and methods, and suggested document structures, it includes examples, checklists, sample policies and procedures, guidelines, and a synopsis of the applicable standards. The author explains how and why procedures are developed and implemented rather than simply provide information and examples. This is an important distinction because no two organizations are exactly alike; therefore, no two sets of policies and procedures are going to be exactly alike. This approach provides the foundation and understanding you need to write effective policies, procedures, and standards clearly and concisely. Developing policies and procedures may seem to be an overwhelming task. However, by relying on the material presented in this book, adopting the policy development techniques, and examining the examples, the task will not seem so daunting. You can use the discussion material to help sell the concepts, which may be the most difficult aspect of the process. Once you have completed a policy or two, you will have the courage to take on even more tasks. Additionally, the skills you acquire will assist you in other areas of your professional and private life, such as expressing an idea clearly and concisely or creating a project plan.

Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0

by Barry L. Williams

Although compliance standards can be helpful guides to writing comprehensive security policies, many of the standards state the same requirements in slightly different ways. Information Security Policy Development for Compliance: ISO/IEC 27001, NIST SP 800-53, HIPAA Standard, PCI DSS V2.0, and AUP V5.0 provides a simplified way to write policies that meet the major regulatory requirements, without having to manually look up each and every control. Explaining how to write policy statements that address multiple compliance standards and regulatory requirements, the book will help readers elicit management opinions on information security and document the formal and informal procedures currently in place. Topics covered include:Entity-level policies and procedures, Access-control policies and procedures, Change control and change management, System information integrity and monitoring, System services acquisition and protection, Informational asset management, Continuity of operations. The book supplies you with the tools to use the full range of compliance standards as guides for writing policies that meet the security needs of your organization. Detailing a methodology to facilitate the elicitation process, it asks pointed questions to help you obtain the information needed to write relevant policies. More importantly, this methodology can help you identify the weaknesses and vulnerabilities that exist in your organization. A valuable resource for policy writers who must meet multiple compliance standards, this guidebook is also available in eBook format. The eBook version includes hyperlinks beside each statement that explain what the various standards say about each topic and provide time-saving guidance in determining what your policy should include.

Information Security Practice and Experience

by Feng Bao Liqun Chen Robert H. Deng Guojun Wang

This book constitutes the refereed proceedings of the 4th International Information Security Practice and Experience Conference, ISPEC 2008, held in Sydney, Australia, in May 2008. The papers cover a wide range of topics.

Information Security Practice and Experience: 15th International Conference, ISPEC 2019, Kuala Lumpur, Malaysia, November 26–28, 2019, Proceedings (Lecture Notes in Computer Science #11879)

by Swee-Huay Heng Javier Lopez

This book constitutes the refereed proceedings of the 15th International Conference on Information Security Practice and Experience, ISPEC 2019, held in Kuala Lumpur, Malaysia, in November 2019. The 21 full and 7 short papers presented in this volume were carefully reviewed and selected from 68 submissions. They were organized into the following topical sections: Cryptography I, System and Network Security, Security Protocol and Tool, Access Control and Authentication, Cryptography II, Data and User Privacy, Short Paper I, and Short Paper II.

Information Security Practice and Experience: 18th International Conference, ISPEC 2023, Copenhagen, Denmark, August 24–25, 2023, Proceedings (Lecture Notes in Computer Science #14341)

by Weizhi Meng Zheng Yan Vincenzo Piuri

This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Information Security Practice and Experience: 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23–25, 2022, Proceedings (Lecture Notes in Computer Science #13620)

by Vincenzo Piuri Chunhua Su Dimitris Gritzalis

This book constitutes the refereed proceedings of the 17th International Conference on Information Security Practice and Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022. The 33 full papers together with 2 invited papers included in this volume were carefully reviewed and selected from 87 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Information Security Practice and Experience: 16th International Conference, ISPEC 2021, Nanjing, China, December 17–19, 2021, Proceedings (Lecture Notes in Computer Science #13107)

by Mark Ryan Ding Wang Feng Bao Robert Deng Weizhi Meng Jian Shen Guilin Wang

This book constitutes the refereed proceedings of the 16th International Conference on Information Security Practice and Experience, ISPEC 2021, held in Nanjing, China, in December 2021. The 23 full papers presented in this volume were carefully reviewed and selected from 94 submissions. The conference focus on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.

Information Security Practice and Experience: 14th International Conference, ISPEC 2018, Tokyo, Japan, September 25-27, 2018, Proceedings (Lecture Notes in Computer Science #11125)

by Chunhua Su Hiroaki Kikuchi

This book constitutes the refereed proceedings of the 14th International Conference on Information Security Practice and Experience, ISPEC 2018, held in Tokyo, Japan, in September 2018. The 39 papers presented in this volume were carefully reviewed and selected from 73 submissions. They were organized in topical sections named: system security; public key cryptography; searchable and functional encryption; post-quantum signature schemas; security protocols; network security; authentication; side-channel attacks; security for cyber-physical systems; security in mobile environment; secure computation and data privacy; and cryptographic protocols.

Information Security Practices

by Isaac Woungang Ahmed Awad Issa Traoré

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Information Security, Privacy and Digital Forensics: Select Proceedings of the International Conference, ICISPD 2022 (Lecture Notes in Electrical Engineering #1075)

by Sankita J. Patel Naveen Kumar Chaudhary Bhavesh N. Gohil S. S. Iyengar

This volume comprises the select proceedings of the International Conference on Information Security, Privacy, and Digital Forensics (ICISPD 2022). The content discusses novel contributions and latest developments in cyber-attacks and defenses, computer forensics and cybersecurity database forensics, cyber threat intelligence, data analytics for security, anonymity, penetration testing, incident response, Internet of Things security, malware and botnets, social media security, humanitarian forensics, software and media piracy, crime analysis, hardware security, among others. This volume will be a useful guide for researchers across industry and academia working in the field of security, privacy, and digital forensics from both technological and social perspectives.

Information Security Risk Analysis

by Thomas R. Peltier

Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment. But just because a threat exists does not mean that your organization is at risk. This is what risk assessment is all about. Information Security Risk Analysis, Third Edition demonstrates how to id

Information Security Risk Management for ISO27001 / ISO27002

by Alan Calder Steve G Watkins

The changing global economy, together with recent corporate and IT governance developments, all provide the context within which organisations have to assess risks to the information assets on which their organisations, and the delivery of their business plan objectives, depend. Information security management decisions are entirely driven by specific decisions made as an outcome of a risk assessment process in relation to identified risks and specific information assets. Risk assessment is, therefore, the core competence of information security management.

Information Security Technologies for Controlling Pandemics (Advanced Sciences and Technologies for Security Applications)

by Hamid Jahankhani Stefan Kendzierskyj Babak Akhgar

The year 2020 and the COVID-19 pandemic marked a huge change globally, both in working and home environments. They posed major challenges for organisations around the world, which were forced to use technological tools to help employees work remotely, while in self-isolation and/or total lockdown. Though the positive outcomes of using these technologies are clear, doing so also comes with its fair share of potential issues, including risks regarding data and its use, such as privacy, transparency, exploitation and ownership. COVID-19 also led to a certain amount of paranoia, and the widespread uncertainty and fear of change represented a golden opportunity for threat actors. This book discusses and explains innovative technologies such as blockchain and methods to defend from Advanced Persistent Threats (APTs), some of the key legal and ethical data challenges to data privacy and security presented by the COVID-19 pandemic, and their potential consequences. It then turns to improved decision making in cyber security, also known as cyber situational awareness, by analysing security events and comparing data mining techniques, specifically classification techniques, when applied to cyber security data. In addition, the book illustrates the importance of cyber security, particularly information integrity and surveillance, in dealing with an on-going, infectious crisis. Aspects addressed range from the spread of misinformation, which can lead people to actively work against measures designed to ensure public safety and minimise the spread of the virus, to concerns over the approaches taken to monitor, track, trace and isolate infectious cases through the use of technology. In closing, the book considers the legal, social and ethical cyber and information security implications of the pandemic and responses to it from the perspectives of confidentiality, integrity and availability.

Information Security Technologies in the Decentralized Distributed Networks (Lecture Notes on Data Engineering and Communications Technologies #115)

by Roman Oliynykov Oleksandr Kuznetsov Oleksandr Lemeshko Tamara Radivilova

The authors explore various aspects of information processing for the design of service systems, efficient management, secure storage, and transmission. In addition, the subline provides knowledge and practice in decentralized ICT technologies, including those based on blockchain. The aim of this book is to analyze and develop methods of building decentralized private databases without the presence of a trusted party, methods of data processing in encrypted form to ensure the confidentiality of information, and accessibility of the corresponding fragment of the original or transformed data. In this book it is also relevant to research methods and protocols routing in infocommunication networks, which provides load balancing in the network, and analysis of intrusion detection methods based on analysis of signatures and anomalies in network behavior (state changes) based on machine learning and fractal analysis methods.

Information Security Theory and Practice: 12th IFIP WG 11.2 International Conference, WISTP 2018, Brussels, Belgium, December 10–11, 2018, Revised Selected Papers (Lecture Notes in Computer Science #11469)

by Olivier Blazy Chan Yeob Yeun

This volume constitutes the refereed proceedings of the 12th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2018, held in Brussels, Belgium, in December 2018. The 13 revised full papers and 2 short papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: real world; cryptography; artificial learning; cybersecurity; and Internet of things.

Information Security Theory and Practice: 14th IFIP WG 11.2 International Conference, WISTP 2024, Paris, France, February 29 – March 1, 2024, Proceedings (Lecture Notes in Computer Science #14625)

by Samia Bouzefrane Damien Sauveron

This volume constitutes the refereed proceedings of the 14th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2024, held in Paris, France. The 12 full papers presented were carefully reviewed and selected from 30 submissions. The papers presented in this proceedings focus on emerging trends in security and privacy, including experimental studies of fielded systems while exploring the application of security technology, and highlighting successful system implementations.

Information Security Theory and Practice

by Sara Foresti Javier Lopez

This volume constitutes the refereed proceedings of the 10th IFIP WG 11. 2 International Conference on Information Security Theory and Practices, WISTP 2016, held in Heraklion, Crete, Greece, in September 2016. The 13 revised full papers and 5 short papers presented together in this book were carefully reviewed and selected from 29 submissions. WISTP 2016 sought original submissions from academia and industry presenting novel research on all theoretical and practical aspects of security and privacy, as well as experimental studies of fielded systems, the application of security technology, the implementation of systems, and lessons learned. The papers are organized in topical sections on authentication and key management; secure hardware systems; attacks to software and network systems; and access control and data protection.

Information Security Theory and Practice: 11th IFIP WG 11.2 International Conference, WISTP 2017, Heraklion, Crete, Greece, September 28–29, 2017, Proceedings (Lecture Notes in Computer Science #10741)

by Gerhard P. Hancke Ernesto Damiani

This volume constitutes the refereed proceedings of the 11th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2017, held in Heraklion, Crete, Greece, in September 2017. The 8 revised full papers and 4 short papers presented were carefully reviewed and selected from 35 submissions. The papers are organized in the following topical sections: security in emerging systems; security of data; trusted execution; defenses and evaluation; and protocols and algorithms.

Information Security Theory and Practice: 13th IFIP WG 11.2 International Conference, WISTP 2019, Paris, France, December 11–12, 2019, Proceedings (Lecture Notes in Computer Science #12024)

by Maryline Laurent Thanassis Giannetsos

This volume constitutes the refereed proceedings of the 13th IFIP WG 11.2 International Conference on Information Security Theory and Practices, WISTP 2019, held in Paris, France, in December 2019. The 12 full papers and 2 short papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in the following topical sections: authentication; cryptography; threats; cybersecurity; and Internet of Things.

Information Services Design: A Design Science Approach for Sustainable Knowledge (Routledge Studies in Organization and Systems)

by Fons Wijnhoven

Information services are economic and organizational activities for informing people. Because informing is changing rapidly under the influence of internet-technologies, this book presents in Chapter 1 fundamental notions of information and knowledge, based on philosopher C.W. Churchman’s inquiring systems. This results in the identification of three product-oriented design theory aspects: content, use value and revenue. Chapter 2 describes how one can cope with these aspects by presenting process-oriented design theory. Both design theory insights are applied in chapters on information services challenges, their business concepts and processes, their architectures and exploitation. The final chapter discusses three case studies that integrate the insights from previous chapters, and it discusses some ideas for future research. This book gives students a coherent start to the topic of information services from a design science perspective, with a balance between technical and managerial aspects. Therefore, this book is useful for modern curricula of management, communication science and information systems. Because of its design science approach, it also explains design science principles. The book also serves professionals and academics in search of a foundational understanding of informing as a science and management practice.

Information Society and the Workplace: Spaces, Boundaries and Agency (Routledge Studies in Technology, Work and Organizations #Vol. 1)

by Jeff Hearn Tuula Heiskanen

Much has been written on the grand prospects for "Information Society"; much less on what this might mean in everyday terms. So what do we find when we look at what is happening in a society, Finland, that is one of closest to an information society? Bringing together studies of everyday local practices in workplaces within information society, this book has a special focus on social space and the agency of actors. It includes both theoretical reviews and detailed qualitative research. It also highlights the political challenges of the information society, challenges which are likely to become subjects of international concern.

Information Society Development through ICT Market Strategies

by Ermelinda Kordha Tolica Kozeta Sevrani Klodiana Gorica

​This book examines the relationship between information society and information communication technology (ICT) markets, while evaluating the ICT impact on Albanian society and its economy. It offers insights on the country's information society development and compares it to other nations. The book begins with a general introduction to information society and efforts that can be used for ICT strategy. It then takes a look at ICT as an industrial sector and uncovers the importance for a strong ICT infrastructure management. Using this background information, the book finally explores the growing information society and ICT sector found in Albania. It measures the information society being created, and compares it to other countries in South Eastern Europe. Next the authors introduce a theoretical model for ICT driven development, focusing on ICT innovation and investment as factors that can affect the ICT market. These factors have also taken into account for strategy development in the national and industry level. ​

Information Spread in a Social Media Age: Modeling and Control

by Michael Muhlmeyer Shaurya Agarwal

The rise of social networks and social media has led to a massive shift in the ways information is dispersed. Platforms like Twitter and Facebook allow people to more easily connect as a community, but they can also be avenues for misinformation, fake news, and polarization. The need to examine, model, and analyze the trajectory of information spread within this new paradigm has never been greater. This text expands upon the authors’ combined teaching experience, engineering knowledge, and multiple academic journal publications on these topics to present an intuitive and easy to understand exploration of social media information spread alongside the technical and mathematical concepts. By design, this book uses simple language and accessible and modern case studies (including those centered around United States mass shootings, the #MeToo social movement, and more) to ensure it is accessible to the casual reader. At the same time, readers with prior knowledge of the topics will benefit from the mathematical model and control elements and accompanying sample simulation code for each main topic. By reading this book and working through the included exercises, readers will gain a general understanding of modern social media systems, network fundamentals, model development techniques, and social marketing. The mathematical modeling of information spread over social media is heavily emphasized through a review of existing epidemiology and marketing based models. The book then presents novel models developed by the authors to account for modern social media concerns such as community filter bubbles, strongly polarized groups, and contentious information spread. Readers will learn how to build and execute simple case studies using Twitter data to help verify the text’s proposed models. Once the reader is armed with a fundamental understanding of mathematical modeling and social media-based system considerations, the book introduces more complex engineering control concepts, including controller design, PID control, and optimal control. Examples of control methods for social campaigns and misinformation mitigation applications are covered in a step-by-step format from problem formulation to solution simulation and results discussions. While many of the examples and methods are framed in the context of controlling social media information spread, the material is also directly applicable to many different types of controllable systems. With the essential background, models, and tools presented within, any interested reader can take the first steps toward exploring and taming the growing complexity of the modern social media age.

Information Storage: A Multidisciplinary Perspective

by Cornelia S. Große Rolf Drechsler

This book examines some of the underlying processes behind different forms of information management, including how we store information in our brains, the impact of new technologies such as computers and robots on our efficiency in storing information, and how information is stored in families and in society. The editors brought together experts from a variety of disciplines. While it is generally agreed that information reduces uncertainties and that the ability to store it safely is of vital importance, these authors are open to different meanings of “information”: computer science considers the bit as the information block; neuroscience emphasizes the importance of information as sensory inputs that are processed and transformed in the brain; theories in psychology focus more on individual learning and on the acquisition of knowledge; and finally sociology looks at how interpersonal processes within groups or society itself come to the fore. The book will be of value to researchers and students in the areas of information theory, artificial intelligence, and computational neuroscience.

Information Storage and Management: Storing, Managing, and Protecting Digital Information in Classic, Virtualized, and Cloud Environments

by Emc Education Services

The new edition of a bestseller, now revised and update throughout! This new edition of the unparalleled bestseller serves as a full training course all in one and as the world's largest data storage company, EMC is the ideal author for such a critical resource. They cover the components of a storage system and the different storage system models while also offering essential new material that explores the advances in existing technologies and the emergence of the "Cloud" as well as updates and vital information on new technologies. Features a separate section on emerging area of cloud computing Covers new technologies such as: data de-duplication, unified storage, continuous data protection technology, virtual provisioning, FCoE, flash drives, storage tiering, big data, and more Details storage models such as Network Attached Storage (NAS), Storage Area Network (SAN), Object Based Storage along with virtualization at various infrastructure components Explores Business Continuity and Security in physical and virtualized environment Includes an enhanced Appendix for additional information This authoritative guide is essential for getting up to speed on the newest advances in information storage and management.

Refine Search

Showing 26,551 through 26,575 of 55,810 results