TOP
紅利積點抵現金,消費購書更貼心
IT Security Controls: A Guide to Corporate Standards and Frameworks
滿額折

IT Security Controls: A Guide to Corporate Standards and Frameworks

商品資訊

定價
:NT$ 3189 元
無庫存,下單後進貨(到貨天數約30-45天)
下單可得紅利積點 :95 點
商品簡介

商品簡介

About the authors

Introduction

Chapter 1. Standards and frameworks

ISO 27001

ISO 27002

ISO 27018 n17

NIST sp 800-53

NIST sp 800-160

PCI DSS

Cloud standards

ISO 17789

NIST sp 500-292

Cobit for it security

CIS controls

Chapter 2. Corporate security controls

Information security processes and services

Security governance

Governance of information security (ISO 27014:2013)

Security metrics

Policies and procedures

Cyber security and risk assessment

Penetration testing

Red teaming

Owasp code review

Compliance scans

Vulnerability scans

Firewall assurance

Risk assessments

Security awareness

Security awareness training

Simulated attacks

Security operations center

Incident response and recovery

Threat hunting

Ediscovery/forensics

Threat intelligence

Cyber crisis management plan

Security engineering

Asset management

Configuration management and security baselines

Security architecture and design

It security technical controls

Off premises unmanaged devices

Secure connections

Clean pipes

DDOS protection

Ipsec / tls encryption

EMM - enterprise mobility management (mdm, mam, mcm)

NAC - network access control

Multi factor authentication

Managed devices

Active directory integration

SCCM - system center configuration manager

TPM - trusted platform module

VPN client

NAC - network access control (agent)

Data classification

UAM - user activity monitoring

Phishing reporting tool

Endpoint protection

Host ips / edr

Desktop firewall

Antivirus

Antispyware

Full disk encryption

App-control / white-listing

Perimeter controls

Firewall

IDS / IPS

Proxy and content filtering

DLP - data leakage/loss protection

Honeypot

WAF - web application firewall

Ssl / vpn

Dns

Message security

Adfs

Sandbox

File integrity

Encrypted email

On premises controls

Mandatory requirements

Vlan segmentation

Criticality

Nature

Type

Security baselines

Redundancy

Load balancing

Production traffic encryption

Multilayer implementation

Tls decryption

Static routing

Disaster recovery

Time synchronization

Redundancy

Physical network segmentation

Distinct heartbeat interfaces

Centralized management

Default gateways

Sinkhole

Public key infrastructure

Security monitoring and enforcement

Privileged access management

Log concentrator

Identity and access management

Vulnerability management and penetration testing

Security information and event management

Database activity monitoring

Risk register

Single sign-on

Chapter 3. It security technical control matrix

Chapter 4. It security processes maturity level matrix

Chapter 5. More about cloud

ISO 17789 and NIST sp500-292 developed

IaaS

SaaS & secaas

Chapter 6. Security testing tools

Web applications attacks

Passive online password hacking

Steganography

Windows log tools

Vulnerability scanner

SQL injection

Wireless attacks

Session hijacking

Bluetooth attacks

Arp poisoning

W

購物須知

外文書商品之書封,為出版社提供之樣本。實際出貨商品,以出版社所提供之現有版本為主。部份書籍,因出版社供應狀況特殊,匯率將依實際狀況做調整。

無庫存之商品,在您完成訂單程序之後,將以空運的方式為你下單調貨。為了縮短等待的時間,建議您將外文書與其他商品分開下單,以獲得最快的取貨速度,平均調貨時間為1~2個月。

為了保護您的權益,「三民網路書店」提供會員七日商品鑑賞期(收到商品為起始日)。

若要辦理退貨,請在商品鑑賞期內寄回,且商品必須是全新狀態與完整包裝(商品、附件、發票、隨貨贈品等)否則恕不接受退貨。

定價:100 3189
無庫存,下單後進貨
(到貨天數約30-45天)

暢銷榜

客服中心

收藏

會員專區