The Basics of Information Security book cover

The Basics of Information Security

Understanding the Fundamentals of InfoSec in Theory and Practice

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

Audience

Security Consultants, IT Managers, Students, Those new to the InfoSec field

Paperback, 208 Pages

Published: June 2011

Imprint: Syngress

ISBN: 978-1-59749-653-7

Reviews

  • "The book includes illustrations and figures demonstrating key information security ideas, alerts to make the reader aware of particular insights, more advanced details for those wishing to do their own research above and beyond the contents of the book, and real world example summaries pertaining to key terms throughout the book. There is also an accessible bibliography mainly made up of online resources. The exercises at the end of each chapter also make this a good book for a first year security college class...All in all, this book is for those new to information security and for persons who are looking to learn about underlying concepts which underpin what is at the heart of information security in organizations."--Computers and Security

    "This book is a great primer for anyone who wants to get into cybersecurity.  It methodically covers the key principles in a easy to understand flow that builds on itself.  I recommend this book for anyone who wants to be able to intelligently discuss cybersecurity at work or in social settings."--Steve Winterfeld, Author of Cyber Warfare and CISSP/PMP

    "The Basics of Digital Forensics is extremely easy to read and understand, and tackles the topic in a very broad manner. All in all, it's a perfect book for those who are interested in the subject and for gauging whether they might be interested in finding out more about it in the future."--HelpNetSecurity

    "The complexity of Information Security is oftentimes overwhelming to those individuals new to the field. Unfortunately, there are too few resources available that can provide a clear and comprehensive understanding of InfoSec. This book rectifies this shortage and provides readers a comprehensive discussion on what every security professional should know intimately."
    - Thomas Wilhelm, HackingDojo.com

    "Overall, this book follows a logical progression and makes good use of heading and subheadings so that the material is easy to follow; diagrams are included where helpful. Boxouts are also used to good effect - you'll find Alerts for points you need to pay attention to and More Advanced for ones you can skip. The boxouts used towards the end of each chapter for ‘Real World’ topics allow the author to break out of textbook style and relate the material to a wider context. The chapters then conclude with a Summary followed by Exercises - a list of questions that serve as a check that you have understood the main points covered. No answers are provided so if you are stumped use the index or re-read before moving on. This book is aimed at beginners and is equally suitable as a course text or for self-study. The developer should, of course, have a working knowledge of the topics it covers and this is a good place to start if you need an overview of the basics."-- Alex Armstrong, i-Programmer.com


Contents

  • Chapter 1. What is Information Security?
    What is Security?
    Models for Discussing Security Issues
    Confidentiality, Integrity, and Availability
    Attacks
    Defense in Depth
    Chapter 2.  Identification and Authentication
    Identification
    Authentication
    Chapter 3. Authorization and Access control
    Authorization
    Access Control
    Access Control Methodologies
    Chapter 4. Auditing and Accountability
    Accountability
    Auditing
    Chapter 5. Cryptography
    History
    Modern Cryptographic Tools
    Protecting Data at Rest, in Motion, and in Use
    Chapter 6. Operations security
    Origins of Operations Security
    The Operations Security Process
    Laws of Operations Security
    Operations Security in our Personal Lives
    Chapter 7. Physical security
    Physical Security Measures
    Protecting People
    Protecting Data
    Protecting Equipment
    Chapter 8. Network security
    Protecting Network Borders
    Protecting Network Traffic
    Network Security Tools
    Chapter 9. Operating System security
    Operating System Hardening
    Anti-Malware Tools
    Software Firewalls and Host Intrusion Detection
    Operating System Security Tools
    Chapter 10. Application security
    Software Vulnerabilities
    Web Security
    Database Security
    Application Security Tools

Advertisement

advert image