The Basics of Information Security

1st Edition

Understanding the Fundamentals of InfoSec in Theory and Practice

Print ISBN: 9781597496537
eBook ISBN: 9781597496544
Imprint: Syngress
Published Date: 10th June 2011
Page Count: 208
23.95 + applicable tax
18.99 + applicable tax
29.95 + applicable tax
Compatible Not compatible
VitalSource PC, Mac, iPhone & iPad Amazon Kindle eReader
ePub & PDF Apple & PC desktop. Mobile devices (Apple & Android) Amazon Kindle eReader
Mobi Amazon Kindle eReader Anything else

Institutional Access


As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

Key Features

  • Learn about information security without wading through huge manuals
  • Covers both theoretical and practical aspects of information security
  • Gives a broad view of the information security field for practitioners, students, and enthusiasts


Security Consultants, IT Managers, Students, Those new to the InfoSec field

Table of Contents

Chapter 1. What is Information Security?
What is Security?
Models for Discussing Security Issues
Confidentiality, Integrity, and Availability
Defense in Depth
Chapter 2.  Identification and Authentication
Chapter 3. Authorization and Access control
Access Control
Access Control Methodologies
Chapter 4. Auditing and Accountability
Chapter 5. Cryptography
Modern Cryptographic Tools
Protecting Data at Rest, in Motion, and in Use
Chapter 6. Operations security
Origins of Operations Security
The Operations Security Process
Laws of Operations Security
Operations Security in our Personal Lives
Chapter 7. Physical security
Physical Security Measures
Protecting People
Protecting Data
Protecting Equipment
Chapter 8. Network security
Protecting Network Borders
Protecting Network Traffic
Network Security Tools
Chapter 9. Operating System security
Operating System Hardening
Anti-Malware Tools
Software Firewalls and Host Intrusion Detection
Operating System Security Tools
Chapter 10. Application security
Software Vulnerabilities
Web Security
Database Security
Application Security Tools


No. of pages:
© Syngress 2011
eBook ISBN:
eBook ISBN:
Paperback ISBN:


"The book includes illustrations and figures demonstrating key information security ideas, alerts to make the reader aware of particular insights, more advanced details for those wishing to do their own research above and beyond the contents of the book, and real world example summaries pertaining to key terms throughout the book. There is also an accessible bibliography mainly made up of online resources. The exercises at the end of each chapter also make this a good book for a first year security college class...All in all, this book is for those new to information security and for persons who are looking to learn about underlying concepts which underpin what is at the heart of information security in organizations."--Computers and Security

"This book is a great primer for anyone who wants to get into cybersecurity.  It methodically covers the key principles in a easy to understand flow that builds on itself.  I recommend this book for anyone who wants to be able to intelligently discuss cybersecurity at work or in social settings."--Steve Winterfeld, Author of Cyber Warfare and CISSP/PMP

"The Basics of Digital Forensics is extremely easy to read and understand, and tackles the topic in a very broad manner. All in all, it's a perfect book for those who are interested in the subject and for gauging whether they might be interested in finding out more about it in the future."--HelpNetSecurity

"The complexity of Information Security is oftentimes overwhelming to those individuals new to the field. Unfortunately, there are too few resources available that can provide a clear and comprehensive understanding of InfoSec. This book rectifies this shortage and provides readers a comprehensive discussion on what every security professional should know intimately."
- Thomas Wilhelm,

"Overall, this book follows