Security from first principles : a practical guide to the information security practice principles /

Saved in:
Bibliographic Details
Author / Creator:Jackson, Craig, author.
Edition:First edition.
Imprint:Sebastopol, CA : O'Reilly Media, [2017]
©2017
Description:1 online resource (1 volume)
Language:English
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/13654115
Hidden Bibliographic Details
Other authors / contributors:Russell, Scott, author.
Sons, Susan, author.
ISBN:9781491996904
9781491996911
Notes:Includes bibliographical references.
Online resource; title from title page (Safari, viewed October 17, 2017).
Summary:Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Security Practice Principles on which all security operates. Created by analysts at Indiana University's Center for Applied Cybersecurity Research, these Principles enable you to assess any guide, policy, or standard--and even create new ones. The Principles provide a framework to help you reason through security implications of devices and systems, regardless of how novel or new that technology may be. You'll be able to analyze and understand security policy, technological controls, and physical security, and assess vendor solutions. Written by the Principle's authors, this report walks InfoSec professionals, managers and executives, and IT engineers through seven principles--Comprehensivity, Opportunity, Rigor, Minimization, Compartmentation, Fault Tolerance, and Proportionality--and explains how they apply in both technical and human/policy contexts. Discover why many organizations have approached the Center for Applied Cybersecurity Research when they have questions about technologies, networks, and organizational structures that are unconventional, complex, or unexplored.
Other form:Print version: Jackson, Craig. Security from first principles : a practical guide to the information security practice principles. Sebastopol, California : O'Reilly Media, 2017 9781491996904

MARC

LEADER 00000cam a2200000 i 4500
001 13654115
006 m o d
007 cr unu||||||||
008 171020s2017 cau ob 000 0 eng d
005 20241126144631.8
020 |z 9781491996904 
020 |z 9781491996911 
035 9 |a (OCLCCM-CC)1006894021 
035 |a (OCoLC)1006894021 
037 |a CL0500000904  |b Safari Books Online 
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d STF  |d OCLCA  |d COO  |d UOK  |d CEF  |d KSU  |d VT2  |d OCLCQ  |d WYU  |d C6I  |d UAB  |d OCLCQ  |d CZL  |d OCLCO  |d OCLCQ  |d OCLCO 
049 |a MAIN 
050 4 |a TK5105.59 
100 1 |a Jackson, Craig,  |e author. 
245 1 0 |a Security from first principles :  |b a practical guide to the information security practice principles /  |c Craig Jackson, Scott Russell, and Susan Sons. 
250 |a First edition. 
264 1 |a Sebastopol, CA :  |b O'Reilly Media,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (1 volume) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed October 17, 2017). 
504 |a Includes bibliographical references. 
520 |a Today, a spate of best practices guides, checklists, policies, and standards pervade nearly every part of information security practice. Some are well thought out and well written, others less so. How do you evaluate them? This report explores the Information Security Practice Principles on which all security operates. Created by analysts at Indiana University's Center for Applied Cybersecurity Research, these Principles enable you to assess any guide, policy, or standard--and even create new ones. The Principles provide a framework to help you reason through security implications of devices and systems, regardless of how novel or new that technology may be. You'll be able to analyze and understand security policy, technological controls, and physical security, and assess vendor solutions. Written by the Principle's authors, this report walks InfoSec professionals, managers and executives, and IT engineers through seven principles--Comprehensivity, Opportunity, Rigor, Minimization, Compartmentation, Fault Tolerance, and Proportionality--and explains how they apply in both technical and human/policy contexts. Discover why many organizations have approached the Center for Applied Cybersecurity Research when they have questions about technologies, networks, and organizational structures that are unconventional, complex, or unexplored. 
650 0 |a Computer networks  |x Access control.  |0 http://id.loc.gov/authorities/subjects/sh2007008424 
650 0 |a Computer networks  |x Security measures.  |0 http://id.loc.gov/authorities/subjects/sh94001277 
650 0 |a Computer security. 
650 2 |a Computer Security  |0 https://id.nlm.nih.gov/mesh/D016494 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
700 1 |a Russell, Scott,  |e author. 
700 1 |a Sons, Susan,  |e author. 
776 0 8 |i Print version:  |a Jackson, Craig.  |t Security from first principles : a practical guide to the information security practice principles.  |d Sebastopol, California : O'Reilly Media, 2017  |z 9781491996904 
856 4 0 |u https://go.oreilly.com/uchicago/library/view/-/9781491996911/?ar  |y O'Reilly 
929 |a oclccm 
999 f f |s a6440704-7f5c-4028-b6b2-600bc004c304  |i ca22501d-0e75-425b-981d-7cfcdfcc96c0 
928 |t Library of Congress classification  |a TK5105.59  |l Online  |c UC-FullText  |u https://go.oreilly.com/uchicago/library/view/-/9781491996911/?ar  |z O'Reilly  |g ebooks  |i 13797055