Principles of Information Security, 4th Ed. - Michael E. Whitman Chap 01

Powerful Essays
Licensed to: CengageBrain User

Licensed to: CengageBrain User

Principles of Information Security, Fourth Edition Michael E. Whitman and Herbert J. Mattord Vice President Editorial, Career Education & Training Solutions: Dave Garza Director of Learning Solutions: Matthew Kane Executive Editor: Steve Helba Managing Editor: Marah Bellegarde Product Manager: Natalie Pashoukos Development Editor: Lynne Raughley Editorial Assistant: Jennifer Wheaton Vice President Marketing, Career Education & Training Solutions: Jennifer Ann Baker Marketing Director: Deborah S. Yarnell Senior Marketing Manager: Erin Coffin Associate Marketing Manager: Shanna Gibbs Production Manager: Andrew Crouth Content Project Manager: Brooke Greenhouse Senior Art Director: Jack Pendleton Manufacturing Coordinator: Amy Rogers Technical Edit/Quality Assurance: Green Pen Quality Assurance

© 2012 Course Technology, Cengage Learning For more information, contact or find us on the World Wide Web at: www.course.com ALL RIGHTS RESERVED. No part of this work covered by the copyright herein may be reproduced, transmitted, stored or used in any form or by any means graphic, electronic, or mechanical, including but not limited to photocopying, recording, scanning, digitizing, taping, Web distribution, information networks, or information storage and retrieval systems, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without the prior written permission of the publisher.
For product information and technology assistance, contact us at Cengage Learning Customer & Sales Support, 1-800-354-9706 For permission to use material from this text or product, submit all requests online at cengage.com/permissions Further permission questions can be emailed to permissionrequest@cengage.com

Library of Congress Control Number: 2010940654 ISBN-13: 978-1-111-13821-9 ISBN-10: 1-111-13821-4 Course Technology 20 Channel Center Boston, MA 02210 USA Cengage Learning is a leading provider of

You May Also Find These Documents Helpful

  • Satisfactory Essays

    SEC571 Principles of Information Security and Privacy Midterm Study Guide The midterm exam consists of 5 questions which relate to material from the first 4 weeks of the course including assigned reading from the text, lectures, tutorials, and threaded discussions. The exam questions are randomly selected for each student from question pools so that the questions you get will be different from those another student gets. Specifically, the questions address Terminal Course Objectives A, B, and…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Information and Communication Security ISIT201/MTS9201/MCS9301 ISIT201/MTS9201/MCS9301 Copyright Notice COMMONWEALTH OF AUSTRALIA Copyright Regulations 1969 WARNING This material has been reproduced and communicated to you by or on behalf of the University of Wollongong pursuant or on behalf of the University of Wollongong pursuant to Part VB of the Copyright Act 1968 (the Act). The material in this communication may be subject to copyright under the Act. Any further reproduction or…

    • 2549 Words
    • 11 Pages
    Powerful Essays
  • Better Essays

    The Principles and Policies of Information Security Computer networks have allowed activity that none dreamed possible hundreds of years ago; however, millions of attempts to compromise the security of computer systems are made on a daily basis. Knowing and using the 12 principles of information security allows security professionals to mitigate most threats to data security. By understanding the different types of security policies, effective policies can be put into place that ensure better information…

    • 841 Words
    • 4 Pages
    Better Essays
  • Good Essays

    P6 Giancoli 4th Ed

    • 2929 Words
    • 12 Pages

    Give some example of everyday vibrating object. which exhibit SHM, at least approximately? 1. The pendulum on an old clock. 2. A guitar string after it gets plucked 3. The vibrations of the little quartz crystal in a digital watch. 2. toys called Newton's cradle 3. the motion of a piston in an engine and 4. the vibrations of the atoms in a solid. 5. A micromass particle of light exhibits SHM.The Reason is that it oscillates without any mass changes during its motion. Is the acceleration…

    • 2929 Words
    • 12 Pages
    Good Essays
  • Good Essays

    Information Security

    • 2188 Words
    • 9 Pages

    Characteristics of Information Security; The extended characteristics of information security as proposed by (Whitman, M.E. & Mattord, H.J, 2010) are planning, policy, programs, protection and project management. Being highly respectable experts in the field of information technology, specifically information systems and security, transfers credibility and authenticity to the anticipated theories. The six characteristics will now be explained. Planning; The planning stage in Information Security (InfoSec)…

    • 2188 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 23429 Words
    • 94 Pages

    today. They received a report on the expenses and lost production from the worm outbreak last month, and they directed us to improve the security of our technology. Gladys says you can help me understand what we need to do about it.” “To start with,” Charlie said, “instead of setting up a computer security solution, we need to develop an information security program. We need a thorough review of our policies and practices, and we need to establish an ongoing risk management program. There are…

    • 23429 Words
    • 94 Pages
    Powerful Essays
  • Good Essays

    Security Principles

    • 682 Words
    • 3 Pages

    Security Principles CMGT/441 November 21, 2012 Security Principles The security principles of information technology (IT) are confidentiality, integrity, and availability for your company data. Confidentiality is the way that a computing system’s assets can be read only by authorized parties. Integrity is that you can only be modified or deleted by authorized parties or in authorized ways. Availability is that the data is accessible to the authorized parties in a timely fashion (Principles…

    • 682 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 1955 Words
    • 8 Pages

    Information Security How to provide it? A Research Paper Presented to The faculty of the De La Salle Lipa In Partial fulfillment Of the requirements for the Course Communication Skills 2 By: John Michael T. Imperial King V. Benedicto ABSTRACT: This research paper provides information about information security. Information security is about protection of important files and data. It is about stopping hackers from breaching over your files and maintaining the…

    • 1955 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    Information Security

    • 1359 Words
    • 4 Pages

    Information Security American Public University Professor Michael Brown August 10, 2012 One of the biggest issues in the Information Technology field these days is information security. Today almost anything can be found on the internet. Even like how to videos on how to put in a window, break-into a house, or even hack computers. The digital age has many perks but it also has many down falls to it as well. The perks that we enjoy so much from the internet also leaves us open to identity…

    • 1359 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Information Security

    • 813 Words
    • 4 Pages

    information security. 1. What do you understand by information security? Explain the CIA triad. Information security:is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction it has also be define as the protection of information systems against unauthorized access to or modification of information, whether in storage, processing or transit, and against the denial of service to authorized users or…

    • 813 Words
    • 4 Pages
    Good Essays