How to use this book |
|
xi | |
Acknowledgments |
|
xiii | |
Introduction |
|
1 | (144) |
|
1. Why is information security necessary? |
|
|
9 | (14) |
|
Nature of information security threats |
|
|
10 | (1) |
|
Prevalence of information security threats |
|
|
11 | (3) |
|
Impacts of information security threats |
|
|
14 | (1) |
|
|
14 | (2) |
|
|
16 | (1) |
|
|
16 | (4) |
|
|
20 | (1) |
|
Benefits of an information security management system |
|
|
20 | (3) |
|
2. Sarbanes—Oxley and regulatory compliance |
|
|
23 | (8) |
|
|
23 | (3) |
|
Enterprise risk management |
|
|
26 | (1) |
|
|
27 | (2) |
|
|
29 | (2) |
|
3. Information security standards |
|
|
31 | (14) |
|
Benefits of certification |
|
|
31 | (1) |
|
History of ISO/IEC 27001 and ISO/IEC 17799 |
|
|
32 | (1) |
|
|
33 | (1) |
|
|
33 | (2) |
|
PDCA and process approach |
|
|
35 | (1) |
|
Structured approach to implementation |
|
|
36 | (2) |
|
Quality system integration |
|
|
38 | (1) |
|
|
39 | (4) |
|
Continual improvement and metrics |
|
|
43 | (2) |
|
4. Organizing information security |
|
|
45 | (18) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Information security manager |
|
|
48 | (1) |
|
The cross-functional management forum |
|
|
49 | (2) |
|
ISO/IEC 27001 project group |
|
|
51 | (5) |
|
Approval process for information processing facilities |
|
|
56 | (1) |
|
Product selection and the Common Criteria |
|
|
57 | (1) |
|
Specialist information security advice |
|
|
58 | (3) |
|
Contact with authorities and with special interest groups |
|
|
61 | (1) |
|
Independent review of information security |
|
|
62 | (1) |
|
|
62 | (1) |
|
5. Information security policy and scope |
|
|
63 | (10) |
|
Information security policy |
|
|
63 | (7) |
|
|
70 | (1) |
|
Costs and monitoring progress |
|
|
71 | (2) |
|
6. The risk assessment and Statement of Applicability |
|
|
73 | (22) |
|
Establishing security requirements |
|
|
73 | (1) |
|
Risks, impacts and risk management |
|
|
74 | (13) |
|
Selection of controls and Statement of Applicability |
|
|
87 | (4) |
|
|
91 | (1) |
|
|
91 | (1) |
|
|
92 | (3) |
|
|
95 | (14) |
|
Identification of risks related to external parties |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
100 | (1) |
|
|
101 | (2) |
|
Addressing security when dealing with customers |
|
|
103 | (1) |
|
Addressing security in third party agreements |
|
|
104 | (5) |
|
|
109 | (18) |
|
|
109 | (1) |
|
|
110 | (3) |
|
|
113 | (1) |
|
Information classification |
|
|
113 | (3) |
|
The US government classification system |
|
|
116 | (1) |
|
Unified classification markings |
|
|
117 | (2) |
|
Information labeling and handling |
|
|
119 | (5) |
|
Non-disclosure agreements and trusted partners |
|
|
124 | (3) |
|
9. Human resources security |
|
|
127 | (18) |
|
Job descriptions and competence requirements |
|
|
128 | (1) |
|
|
129 | (3) |
|
Terms and conditions of employment |
|
|
132 | (2) |
|
|
134 | (6) |
|
|
140 | (1) |
|
Termination or change of employment |
|
|
141 | (4) |
10. Physical and environmental security |
|
145 | (12) |
|
|
145 | (9) |
|
Public access, delivery and loading areas |
|
|
154 | (3) |
11. Equipment security |
|
157 | (10) |
|
Equipment siting and protection |
|
|
157 | (3) |
|
|
160 | (2) |
|
|
162 | (1) |
|
|
163 | (1) |
|
Security of equipment off-premises |
|
|
164 | (1) |
|
Secure disposal or reuse of equipment |
|
|
165 | (1) |
|
|
165 | (2) |
12. Communications and operations management |
|
167 | (14) |
|
Documented operating procedures |
|
|
167 | (2) |
|
|
169 | (1) |
|
|
170 | (1) |
|
Separation of development, test and operational facilities |
|
|
171 | (1) |
|
Third party service delivery management |
|
|
172 | (2) |
|
Monitoring and review of third party services |
|
|
174 | (1) |
|
Managing changes to third party services |
|
|
175 | (1) |
|
System planning and acceptance |
|
|
176 | (5) |
13. Controls against malicious software (malware) and back-ups |
|
181 | (14) |
|
Viruses, worms and Trojans |
|
|
182 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (3) |
|
|
188 | (1) |
|
Controls against mobile code |
|
|
189 | (1) |
|
|
190 | (5) |
14. Network security management and media handling |
|
195 | (8) |
|
|
195 | (3) |
|
|
198 | (5) |
15. Exchanges of information |
|
203 | (8) |
|
Information exchange policies and procedures |
|
|
203 | (3) |
|
|
206 | (1) |
|
Physical media in transit |
|
|
207 | (1) |
|
Business information systems |
|
|
208 | (3) |
16. Electronic commerce services |
|
211 | (12) |
|
|
211 | (3) |
|
|
214 | (3) |
|
|
217 | (1) |
|
|
218 | (1) |
|
Publicly available information |
|
|
219 | (4) |
17. E-mail and internet use |
|
223 | (8) |
|
|
224 | (2) |
|
|
226 | (2) |
|
Internet acceptable use policy (AUP) |
|
|
228 | (3) |
18. Access control |
|
231 | (18) |
|
|
232 | (1) |
|
|
232 | (3) |
|
|
235 | (1) |
|
|
236 | (2) |
|
|
238 | (9) |
|
Clear desk and clear screen policy |
|
|
247 | (2) |
19. Network access control |
|
249 | (12) |
|
|
249 | (4) |
|
|
253 | (8) |
20. Operating system access control |
|
261 | (6) |
|
|
261 | (2) |
|
User identification and authentication |
|
|
263 | (1) |
|
Password management system |
|
|
263 | (1) |
|
|
264 | (1) |
|
|
265 | (1) |
|
Limitation of connection time |
|
|
265 | (2) |
21. Application access control and teleworking |
|
267 | (8) |
|
Application and information access control |
|
|
267 | (2) |
|
Mobile computing and teleworking |
|
|
269 | (6) |
22. Systems acquisition, development and maintenance |
|
275 | (6) |
|
Security requirements analysis and specification |
|
|
276 | (1) |
|
Correct processing in applications |
|
|
276 | (5) |
23. Cryptographic controls |
|
281 | (8) |
|
|
282 | (1) |
|
Public key infrastructure (PKI) |
|
|
283 | (1) |
|
|
284 | (1) |
|
|
285 | (1) |
|
|
286 | (3) |
24. Security in development and support processes |
|
289 | (10) |
|
|
289 | (2) |
|
Access control to program source code |
|
|
291 | (1) |
|
Development and support processes |
|
|
291 | (4) |
|
|
295 | (4) |
25. Monitoring and information security incident management |
|
299 | (16) |
|
|
299 | (5) |
|
Information security events |
|
|
304 | (5) |
|
Management of information security incidents and improvements |
|
|
309 | (6) |
26. Business continuity management |
|
315 | (12) |
|
Business continuity management process |
|
|
316 | (1) |
|
Business continuity and risk assessment |
|
|
317 | (1) |
|
Developing and implementing continuity plans |
|
|
318 | (2) |
|
Business continuity planning framework |
|
|
320 | (3) |
|
Testing, maintaining and reassessing business continuity plans |
|
|
323 | (4) |
27 Compliance |
|
327 | (18) |
|
Identification of applicable legislation |
|
|
328 | (7) |
|
Intellectual property rights (IPR) |
|
|
335 | (2) |
|
Safeguarding of organizational records |
|
|
337 | (2) |
|
Data protection and privacy of personal information |
|
|
339 | (1) |
|
Prevention of misuse of information processing facilities |
|
|
339 | (1) |
|
Regulation of cryptographic controls |
|
|
340 | (1) |
|
Compliance with security policies and standards |
|
|
341 | (2) |
|
Information systems audit considerations |
|
|
343 | (2) |
28. The ISO/IEC 27001 audit |
|
345 | (6) |
|
|
346 | (1) |
|
|
347 | (1) |
|
|
348 | (3) |
Useful websites |
|
351 | (4) |
Further reading |
|
355 | (2) |
Index |
|
357 | |