|
|
Showing 1 - 4 of
4 matches in All Departments
Security without Obscurity: Frequently Asked Questions (FAQ)
complements Jeff Stapleton's three other Security without Obscurity
books to provide clear information and answers to the most commonly
asked questions about information security (IS) solutions that use
or rely on cryptography and key management methods. There are good
and bad cryptography, bad ways of using good cryptography, and both
good and bad key management methods. Consequently, information
security solutions often have common but somewhat unique issues.
These common and unique issues are expressed as an FAQ organized by
related topic areas. The FAQ in this book can be used as a
reference guide to help address such issues. Cybersecurity is based
on information technology (IT) that is managed using IS controls,
but there is information, misinformation, and disinformation.
Information reflects things that are accurate about security
standards, models, protocols, algorithms, and products.
Misinformation includes misnomers, misunderstandings, and lack of
knowledge. Disinformation can occur when marketing claims either
misuse or abuse terminology, alluding to things that are inaccurate
or subjective. This FAQ provides information and distills
misinformation and disinformation about cybersecurity. This book
will be useful to security professionals, technology professionals,
assessors, auditors, managers, and hopefully even senior management
who want a quick, straightforward answer to their questions. It
will serve as a quick reference to always have ready on an office
shelf. As any good security professional knows, no one can know
everything.
Information security has a major gap when cryptography is
implemented. Cryptographic algorithms are well defined, key
management schemes are well known, but the actual deployment is
typically overlooked, ignored, or unknown. Cryptography is
everywhere. Application and network architectures are typically
well-documented but the cryptographic architecture is missing. This
book provides a guide to discovering, documenting, and validating
cryptographic architectures. Each chapter builds on the next to
present information in a sequential process. This approach not only
presents the material in a structured manner, it also serves as an
ongoing reference guide for future use.
Information security has a major gap when cryptography is
implemented. Cryptographic algorithms are well defined, key
management schemes are well known, but the actual deployment is
typically overlooked, ignored, or unknown. Cryptography is
everywhere. Application and network architectures are typically
well-documented but the cryptographic architecture is missing. This
book provides a guide to discovering, documenting, and validating
cryptographic architectures. Each chapter builds on the next to
present information in a sequential process. This approach not only
presents the material in a structured manner, it also serves as an
ongoing reference guide for future use.
Security without Obscurity: Frequently Asked Questions (FAQ)
complements Jeff Stapleton's three other Security without Obscurity
books to provide clear information and answers to the most commonly
asked questions about information security (IS) solutions that use
or rely on cryptography and key management methods. There are good
and bad cryptography, bad ways of using good cryptography, and both
good and bad key management methods. Consequently, information
security solutions often have common but somewhat unique issues.
These common and unique issues are expressed as an FAQ organized by
related topic areas. The FAQ in this book can be used as a
reference guide to help address such issues. Cybersecurity is based
on information technology (IT) that is managed using IS controls,
but there is information, misinformation, and disinformation.
Information reflects things that are accurate about security
standards, models, protocols, algorithms, and products.
Misinformation includes misnomers, misunderstandings, and lack of
knowledge. Disinformation can occur when marketing claims either
misuse or abuse terminology, alluding to things that are inaccurate
or subjective. This FAQ provides information and distills
misinformation and disinformation about cybersecurity. This book
will be useful to security professionals, technology professionals,
assessors, auditors, managers, and hopefully even senior management
who want a quick, straightforward answer to their questions. It
will serve as a quick reference to always have ready on an office
shelf. As any good security professional knows, no one can know
everything.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|