Book Details


IT Security Controls : A Guide to Corporate Standards and Frameworks / Virgilio Viegas, Oben Kuyucu

Publication year: 2022

ISBN: 978-1-4842-7799-7

Internet Resource: Please Login to download book

Gives an overview of the major standards and frameworks, and a proposed architecture to meet them. The book identifies and describes the necessary controls and processes that must be implemented in order to secure your organization's infrastructure. The book proposes a comprehensive approach to the implementation of IT security controls with an easily understandable graphic implementation proposal to comply with the most relevant market standards (ISO 27001, NIST, PCI-DSS, and COBIT) and a significant number of regulatory frameworks from central banks across the World (European Union, Switzerland, UK, Singapore, Hong Kong, India, Qatar, Kuwait, Saudi Arabia, Oman, etc.). You will learn: Understand corporate IT security controls, including governance, policies, procedures, and security awareness Know cybersecurity and risk assessment techniques such as penetration testing, red teaming, compliance scans, firewall assurance, and vulnerability scans Understand technical IT security controls for unmanaged and managed devices, and perimeter controls Implement security testing tools such as steganography, vulnerability scanners, session hijacking, intrusion detection, and more

Subject: Data and Information Security, IT Risk Management, Principles and Models of Security, Information Security, Data Protection, Backup and Recovery, Dangers of IT use, Computer Sabotage, Computer Crime, Protective measures, Encryption, Getting started with data security, Data backup, Data destruction, Hacking, Trojan, Virus, Sniffer, Keylogger, Firewall, Router, Technical and organisational measures, Information security standards, Security standards, Corporate security controls, Security frameworks, Cybersecurity, Risk assessment, Security awareness, Information security processes, Security operations center, Security engineering, IT security technical controls, Security testing tools