Skip to:Content
|
Bottom
Cover image for Information security : a strategic approach
Title:
Information security : a strategic approach
Personal Author:
Publication Information:
Hoboken, NJ : John Wiley & Sons, 2006
ISBN:
9780471736127

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010148883 QA76.9.A25 L484 2006 Open Access Book Book
Searching...

On Order

Summary

Summary

Bridging the gap between information security and strategic planning


This publication is a reflection of the author's firsthand experience as an information security consultant, working for an array of clients in the private and public sectors. Readers discover how to work with their organizations to develop and implement a successful information security plan by improving management practices and by establishing information security as an integral part of overall strategic planning.

The book starts with an overview of basic concepts in strategic planning, information technology strategy, and information security strategy. A practical guide to defining an information security strategy is then provided, covering the "nuts and bolts" of defining long-term information security goals that effectively protect information resources. Separate chapters covering technology strategy and management strategy clearly demonstrate that both are essential, complementary elements in protecting information.

Following this practical introduction to strategy development, subsequent chapters cover the theoretical foundation of an information security strategy, including:
* Examination of key enterprise planning models that correspond to different uses of information and different strategies for securing information
* Review of information economics, an essential link between information security strategy and business strategy
* Role of risk in building an information security strategy

Two separate case studies are developed, helping readers understand how the development and implementation of information security strategies can work within their own organizations.

This is essential reading for information security managers, information technology executives, and consultants. By linking information security to general management strategy, the publication is also recommended for nontechnical executives who need to protect the value and security of their organization's information.


Author Notes

Vincent LeVeque is a Senior Security Engineer for a large systems integrator and technology consulting firm, and previously worked for a large public accounting firm in their information risk management practice


Table of Contents

List of Figuresp. xiii
Prefacep. xv
1 Introductionp. 1
Strategy Overviewp. 1
Strategy and Information Technologyp. 2
Strategy and Information Securityp. 2
An Information Security Strategic Planning Methodologyp. 4
The Business Environmentp. 4
Information Valuep. 5
Riskp. 5
The Strategic Planning Processp. 6
The Technology Planp. 6
The Management Planp. 6
Theory and Practicep. 7
2 Developing an Information Security Strategyp. 9
Overviewp. 9
An Information Security Strategy Development Methodologyp. 10
Strategy Prerequisitesp. 11
Research Sourcesp. 12
Preliminary Developmentp. 18
Formal Project Introductionp. 18
Fact Findingp. 18
General Background Informationp. 19
Documentation Reviewp. 19
Interviewsp. 20
Surveysp. 22
Research Sourcesp. 23
Analysis Methodsp. 23
Strengths, Weaknesses, Opportunities, and Threatsp. 24
Business Systems Planningp. 25
Life-Cycle Methodsp. 27
Critical Success Factorsp. 28
Economic Analysisp. 29
Risk Analysisp. 31
Benchmarks and Best Practicesp. 32
Compliance Requirementsp. 33
Analysis Focus Areasp. 34
Industry Environmentp. 35
Organizational Mission and Goalsp. 35
Executive Governancep. 36
Management Systems and Controlsp. 36
Information Technology Managementp. 37
Information Technology Architecturep. 39
Security Managementp. 40
Draft Plan Presentationp. 42
Final Plan Presentationp. 43
Options for Plan Developmentp. 44
A Plan Outlinep. 45
Selling the Strategyp. 47
Plan Maintenancep. 49
The Security Assessment and the Security Strategyp. 49
Strategy Implementationp. 51
What is a Tactical Plan?p. 52
Converting Strategic goals to Tactical Plansp. 52
Turning Tactical Planning Outcomes into Ongoing Operationsp. 53
Key Pointsp. 53
Plan Outlinep. 56
3 The Technology Strategyp. 59
Thinking About Technologyp. 59
Planning Technology Implementationp. 61
Technology Forecastingp. 62
Some Basic Advicep. 66
Technology Life-Cycle Modelsp. 68
Technology Solution Evaluationp. 69
Role of Analystsp. 70
Technology Strategy Componentsp. 72
The Security Strategy Technical Architecturep. 73
Leveraging Existing Vendorsp. 76
Legacy Technologyp. 77
The Management Dimensionp. 78
Overall Technical Designp. 79
The Logical Technology Architecturep. 82
Specific Technical Componentsp. 84
Serversp. 84
Network Zonesp. 85
External Network Connectionsp. 86
Desktop Systemsp. 86
Applications and DBMSp. 88
Portable Computing Devicesp. 90
Telephone Systemsp. 91
Control Devicesp. 92
Intelligent Peripheralsp. 93
Facility Security Systemsp. 94
Security Management Systemsp. 96
Key Pointsp. 100
4 The Management Strategyp. 109
Control Systemsp. 111
Control Systems and the Information Security Strategyp. 113
Governancep. 116
Ensuring IT Governancep. 117
IT Governance Modelsp. 118
Current Issues in Governancep. 120
Control Objectives for Information and Related Technology (CobiT)p. 121
IT Balanced Scorecardp. 121
Governance in Information Securityp. 122
End-User Rolep. 123
An IT Management Model for Information Securityp. 124
Policies, Procedures, and Standardsp. 131
Assigning Information Security Responsibilitiesp. 134
To Whom Should Information Security Report?p. 135
Executive Rolesp. 136
Organizational Interfacesp. 138
Information Security Staff Structurep. 141
Staffing and Funding Levelsp. 142
Managing Vendorsp. 146
Organizational Culture and Legitimacyp. 149
Training and Awarenessp. 152
Key Pointsp. 153
5 Case Studiesp. 155
Case Study 1 Singles Opportunity Servicesp. 155
Backgroundp. 155
Developing the Strategic Planp. 157
Information Value Analysisp. 158
Risk Analysisp. 159
Technology Strategyp. 161
Management Strategyp. 162
Implementationp. 164
Case Study 2 Rancho Nachos Mosquito Abatement Districtp. 166
Backgroundp. 166
Developing the Strategic Planp. 168
Information Value Analysisp. 169
Risk Analysisp. 170
Technology Strategyp. 171
Management Strategyp. 172
Implementationp. 173
Key Pointsp. 174
6 Business and IT Strategyp. 175
Introductionp. 175
Strategy and Systems of Managementp. 176
Business Strategy Modelsp. 178
Boston Consulting Group Business Matrixp. 178
Michael Porter-Competitive Advantagep. 181
Business Process Reengineeringp. 183
The Strategy of No Strategyp. 185
IT Strategyp. 190
Nolan/Gibson Stages of Growthp. 191
Information Engineeringp. 194
Rockart's Critical Success Factorsp. 198
IBM Business System Planning (BSP)p. 199
So is IT really "strategic"?p. 201
IT Strategy and Information Security Strategyp. 202
Key Pointsp. 203
7 Information Economicsp. 205
Concepts of Information Protectionp. 205
Information Ownershipp. 208
From Ownership to Assetp. 211
Information Economics and Information Securityp. 214
Basic Economic Principlesp. 215
Why is Information Economics Difficult?p. 219
Information Value-Reducing Uncertaintyp. 220
Information Value-Improved Business Processesp. 223
Information Security Investment Economicsp. 224
The Economic Cost of Security Failuresp. 225
Future Directions in Information Economicsp. 227
Information Management Accounting-Return on Investmentp. 228
Economic Models and Management Decision Makingp. 229
Information Protection or Information Stewardship?p. 231
Key Pointsp. 232
8 Risk Analysisp. 235
Compliance Versus Risk Approachesp. 235
The "Classic" Risk Analysis Modelp. 240
Newer Risk Modelsp. 243
Process-Oriented Risk Modelsp. 243
Tree-Based Risk Modelsp. 245
Organizational Risk Culturesp. 247
Risk Averse, Risk Neutral, and Risk Taking Organizationsp. 248
Strategic Versus Tactical Risk Analysisp. 254
When Compliance-based Models are Appropriatep. 255
Risk Mitigationp. 256
Key Pointsp. 257
Notes and Referencesp. 259
Indexp. 265
Go to:Top of Page