Ashutosh Bahuguna

ผลงานที่ได้รับความนิยมสูงสุด
  316     570

-  File 1
ชื่อเรื่อง :  Information Security Assurance
คำอธิบาย :  BLOCK I: UNIT I: INFORMATION SECURITY STANDARDS: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 INFORMATION SECURITY STANDARDS; 1.4 SUMMARY; 1.5 CHECK YOUR PROGRESS; 1.6 ANSWERS TO CHECK YOUR PROGRESS; 1.7 MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 IT ACT; 2.4 SARBANES-OXLEY ACT (SOX) ; 2.5 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS) ; 2.6 CHILDRES‘S ONLINE PRIVACY PROTECTION ACT (COPPA) ; 2.7 HIPPA; 2.8 GLBA; 2.9 FISMA; 2.10 FIPS; 2.11 FFIEC; 2.12 CYBER SECURITY; 2.13 SECURITY CONTROLS; 2.14 COMMON PITFALLS OF INFORMATIN SECURITY PROGRAM; 2.15 COMMON ELEMENTS OF COMLPINANCE; 2.16 SUMMMARY; 2.17 CHECK YOUR PROGRESS; 2.18 ANSWERS TO CHECK YOUR PROGRESS; 2.19 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 ISO/IEC 15408 (EVALUATIN CRITERIA FOR IT SECURITY) ; 3.3 ISO/IEC 13335 (IT SECURITY MANAGEMENT) ; 3.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDATDS (PCI DSS) ; 3.5 COBIT; 3.6 ITIL (OR ISO/IEC 20000 SERIES) ; 4.1 LEARNING OBJECTIVES; 4.2 NIST; 4.3 SANS (SysAdmi, Audit, Networkig, ad Security) ; 4.4 OWASP (OPEN WEB APPLICATION SECURITY PROJECT) ; 4.5 SUMMARY; 4.6 CHECK YOUR PROGRESS; 4.7 ANSWERS TO CHECK YOUR PROGRESS; 4.8 MODEL QUESTIONS; BLOCK II: 1.1 LEARNING OBJECTIVES; 1.2 INTRODUCTION; 1.3 INFORMATION SECURITY MANAGEMENT SYSTEM; 1.4 ISMS PLANNING; 1.5 ISMS DOCUMENTATION; 1.6 INFORMATION SECURITY POLICY; 1.7 PLAN-DO-CHECK-DO (PDCA) CYCLE; 1.8 LET US SUM UP; 1.9 CHECK YOUR PROGRESS; 1.10MODEL QUESTIONS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 BENEFITS OF INTERNATIONAL STANDARDS; 2.4 STANDARDS DEVELOPMENT; 2.5 POPULAR ISO STANDARDS; 2.6 ISO 27K SERIES OF STANDARDS; 2.7 LET US SUM UP; 2.8 CHECK YOUR PROGRESS; 2.9 MODEL QUESTIONS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 ISO/IEC 27000; 3.4 ISO/IEC 27001; 3.5 ISO/IEC 27002; 3.6 ISO/IEC 27001 CERTIFICATION PROCESS; 3.7 NIST CYBER SECURITY FRAMEWORK AND ISO 27001; 3.8 LET US SUM UP; 3.9 CHECK YOUR PROGRESS; 3.10 ANSWERS TO CHECK YOUR PROGRESS; 3.11 MODEL QUESTIONS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 CONCEPT OF AUDITING; 4.4 AUDIT ACTIVTIES; 4.5 ISMS INTERNAL AUDIT; 4.6 GUIDELINES FOR AUDITORS/AUDITING ORGANIZATIONS; 4.7 GUIDELINES FOR AUDITEE; 4.8 LET US SUM UP; 4.9 CHECK YOUR PROGRESS; 4.9 ANSWERS TO CHECK YOUR PROGRESS; 4.10 MODEL QUESTIONS; BLOCK III: 1.1LEARNING OBJECTIVES; 1.2 SECURITY AUDIT; 1.3 THE AUDITED SYSTEMS; 1.4 SECURITY AUDIT STANDARDS; 1.5 AUDITING APPLICATION SECURITY; 1.6 SECURITY AUDIT PLANNING; 1.7 SECUITY AUDIT REPORTING; 1.8 AUDIT EVENT REPORTING; 1.9 SUMMARY; 1.10 CHECK YOUR PROGRESS; 1.11 ANSWER TO CHECK YOUR PROGRESS; 2.1 LEARNING OBJECTIVES; 2.2 INTRODUCTION; 2.3 WHY IS INFORMATION SECURITY IMPORTANT? ; 2.4 WHAT IS INFORMATION? ; 2.5 DEFINITIONS; 2.6 KEY CONCEPTS; 2.7 RISK MANAGEMENT; 2.8 CONTROLS; 2.9 DEFENSE IN DEPTH; 2.10 SECURITY CLASSIFICATION FOR INFORMATION; 2.11 ACCESSCONTROL; 2.12 PROTECTING COMPANY INFORMATION; 2.13 CRYPTOGRAPHY; 2.14 PROCESS; 2.15 BUSINESS CONTINUITY; 2.16 LAWS AND REGULATIONS; 2.17 SUMMARY; 2.18 CHECK YOUR PROGRESS; 2.19 ANSWERS TO CHECK YOUR PROGRESS; 3.1 LEARNING OBJECTIVES; 3.2 INTRODUCTION; 3.3 THE DEVELOPMENT OF DISASTER RECOVERY; 3.5 CLASSIFICATION OF DISASTERS; 3.6 RELATIONSHIP TO THE BUSINESS CONTINUITY PLAN; 3.7 IT DISASTER RECOVERY CONTROL MEASURES; 3.8 DISASTER RECOVERY PLANNING METHODOLOGY; 3.9 CAVEATS/CONTROVERSIES; 3.10 SUMMARY; 3.11 CHECK YOUR PROGRESS; 3.12 ANSWERS TO CHECK YOUR PROGRESS; 4.1 LEARNING OBJECTIVES; 4.2 INTRODUCTION; 4.3 WHAT IS BUSINESS CONTINUITY PLANNING? ; 4.3.1 Why is busiess cotiuity plaig importat? ; 4.4 CREATING A BUSINESS COUNTINUITY PLAN; 4.5 CONCLUSION; 4.6 SUMARY; 4.7 CHECK YOUR PROGRESS; 4.8 ANSWERS TO CHECK YOUR PROGRESS; 4.9 MODEL QUESTION; Refereces, Article source ad Cotributors
คำสำคัญ :   Information Security Assurance, Information System, Information Security, Cyber Security, Information Communication Technology, Computer, Post-Graduate Diploma in Cyber Security Information Security
ผู้สร้างสรรค์/ผู้แต่ง/เจ้าของผลงาน :   Mukesh Kumar Verma
เจ้าของผลงานร่วม :   Ashutosh Bahuguna, Rajesh Arya, Uttarakhand Open University, Commonwealth Educational Media Centre for Asia
สื่อสำหรับบุคคลประเภท :   ครู / อาจารย์, นักเรียน / นักศึกษา, ทั่วไป, ผู้ปกครอง
ระดับชั้น :   ปริญญาตรี , ปริญญาโท, ปริญญาเอก, การศึกษาตามอัธยาศัย
สาขาวิชาของสื่อ :   วิทยาศาสตร์, การงานอาชีพและเทคโนโลยี
ลักษณะของสื่อ :   Textbooks, หนังสือ
ผลงานทั้งหมด
4
ผู้เข้าชม
1,082
ดาวน์โหลด
3,645
ผลงานที่ได้รับความนิยมสูงสุด 5 อันดับ
Information Security Assurance 316
Fundamentals of Information Security 258
Advanced Cyber Security Techniques 244
Cyber Security Techniques 240

ผลงาน 5 อันดับล่าสุด
Advanced Cyber Security Techniques 4 สิงหาคม 2561
Information Security Assurance 4 สิงหาคม 2561
Cyber Security Techniques 4 สิงหาคม 2561
Fundamentals of Information Security 4 สิงหาคม 2561
ผลงานที่ได้รับความนิยมสูงสุด 5 อันดับ
จำนวนข้อมูลจำแนกตามระดับชั้น
จำนวนข้อมูลจำแนกตามประเภทบุคคล