Skip to main content Site map

Assessing and Managing Security Risk in IT Systems: A Structured Methodology


Assessing and Managing Security Risk in IT Systems: A Structured Methodology

Hardback by McCumber, John (Symantec Corporation, Reston, Virginia, USA)

Assessing and Managing Security Risk in IT Systems: A Structured Methodology

WAS £69.99   SAVE £10.50

£59.49

ISBN:
9780849322327
Publication Date:
12 Aug 2004
Language:
English
Publisher:
Taylor & Francis Ltd
Imprint:
Auerbach
Pages:
288 pages
Format:
Hardback
For delivery:
Estimated despatch 15 - 20 May 2024
Assessing and Managing Security Risk in IT Systems: A Structured Methodology

Description

Assessing and Managing Security Risk in IT Systems: A Structured Methodology builds upon the original McCumber Cube model to offer proven processes that do not change, even as technology evolves. This book enables you to assess the security attributes of any information system and implement vastly improved security environments. Part I delivers an overview of information systems security, providing historical perspectives and explaining how to determine the value of information. This section offers the basic underpinnings of information security and concludes with an overview of the risk management process. Part II describes the McCumber Cube, providing the original paper from 1991 and detailing ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems. Part III serves as a resource for analysts and security practitioners who want access to more detailed information on technical vulnerabilities and risk assessment analytics. McCumber details how information extracted from this resource can be applied to his assessment processes.

Contents

SECURITY CONCEPTS. Using models. Defining information security. Information as an asset. Understanding threat and its relation to vulnerabilities. Assessing risk variables: The risk assessment process. THE MCCUMBER CUBE METHODOLOGY. The McCumber Cube. Determining information states and mapping information flow. Decomposing the cube for security enforcement. Information state analysis for components and subsystems. Managing the security life cycle. Safeguard analysis. Practical applications of McCumber Cube Analysis. APPENDICES.

Back

University of Bedfordshire logo