A Practical Guide to Security Assessments

Front Cover
CRC Press, Sep 29, 2004 - Business & Economics - 520 pages
The modern dependence upon information technology and the corresponding information security regulations and requirements force companies to evaluate the security of their core business processes, mission critical data, and supporting IT environment. Combine this with a slowdown in IT spending resulting in justifications of every purchase, and security professionals are forced to scramble to find comprehensive and effective ways to assess their environment in order to discover and prioritize vulnerabilities, and to develop cost-effective solutions that show benefit to the business. A Practical Guide to Security Assessments is a process-focused approach that presents a structured methodology for conducting assessments. The key element of the methodology is an understanding of business goals and processes, and how security measures are aligned with business risks. The guide also emphasizes that resulting security recommendations should be cost-effective and commensurate with the security risk. The methodology described serves as a foundation for building and maintaining an information security program. In addition to the methodology, the book includes an Appendix that contains questionnaires that can be modified and used to conduct security assessments. This guide is for security professionals who can immediately apply the methodology on the job, and also benefits management who can use the methodology to better understand information security and identify areas for improvement.

From inside the book

Contents

Chapter 1 Introduction
1
Chapter 2 Evolution of Information Security
5
Chapter 3 The Information Security Program and How a Security Assessment Fits In
45
Chapter 4 Planning
67
Chapter 5 Initial Information Gathering
103
Chapter 6 Business Process Evaluation
139
Chapter 7 Technology Evaluation
165
Chapter 8 Risk Analysis and Final Presentation
193
Backup and Recovery
297
Externally Hosted Services
309
Physical Security
325
Employee Termination
343
Incident Handling
351
Business to Business B2B
361
Business to Consumer B2C
371
Change Management
385

Chapter 9 Information Security Standards
229
Chapter 10 Information Security Legislation
245
Security Questionnaires and Checklists
255
Preliminary Checklist to Gather Information
259
Generic Questionnaire for Meetings with Business Process Owners
271
Generic Questionnaire for Meetings with Technology Owners
277
Data Classification
283
Data Retention
291
User ID Administration
391
Managed Security
403
Media Handling
415
HIPAA Security
423
Index
487
Back cover
499
Copyright

Other editions - View all

Common terms and phrases

Popular passages

Page 484 - Ibid 5 Ibid 6 Ibid 7 Ibid 8 Ibid 9 Ibid 10 Ibid 11 Ibid 12 Ibid 13 Ibid 14 Ibid 15 Ibid 16 Ibid 17 Ibid...
Page 425 - An employee welfare benefit plan or any other arrangement that is established or maintained for the purpose of offering or providing health benefits to the employees of two or more employers. (ix) The health care program for active military personnel under title 10 of the United States Code. (x) The veterans health care program under 38 USC chapter 17.
Page 470 - Implement policies and procedures that specify the proper functions to be performed, the manner in which those functions are to be performed, and the physical attributes of the surroundings of a specific workstation or class of workstation that can access electronic protected health information.
Page 241 - Fites et al. [4], who recommend that one take the following steps: 1 . Identify what you are trying to protect. 2. Determine what you are trying to protect it from. 3. Determine how likely the threats are. 4. Implement measures that will protect your assets in a cost-effective manner. 5. Review the process continuously, and make improvements each time a weakness is found. Most...
Page 252 - adequacy" standard for privacy protection. While the United States and the European Union share the goal of enhancing privacy protection for their citizens, the United States takes a different approach to privacy from that taken by the European Union. The United States uses a sectoral approach that relies on a mix of legislation, regulation, and self-regulation.
Page 469 - Implement procedures to control and validate a person's access to facilities based on their role or function, including visitor control, and control of access to software programs for testing and revision.
Page 425 - An approved State child health plan under title XXI of the Act, providing benefits for child health assistance that meet the requirements of section 2103 of the Act, 42 USC 1397, et seq.
Page 460 - Contingency plan. Establish (and implement as needed) policies and procedures for responding to an emergency or other occurrence (for example, fire, vandalism, system failure, and natural disaster) that damages systems that contain electronic protected health information, (ii) Implementation specifications: (A) Data backup plan (Required).

References to this book

About the author (2004)

Sudhanshu Kairab (Amper, Politziner, & Mattia, P.C., New Jersey, USA)