Information Security:A Strategic Approach

Cover Image Copyright Year: 2006
Author(s): Vincent LeVeque
Book Type: Wiley-IEEE Press
Content Type : Books
Topics: Communication, Networking & Broadcasting ;  Computing & Processing
  • Print

Abstract

Bridging the gap between information security and strategic planning

This publication is a reflection of the author's firsthand experience as an information security consultant, working for an array of clients in the private and public sectors. Readers discover how to work with their organizations to develop and implement a successful information security plan by improving management practices and by establishing information security as an integral part of overall strategic planning.

The book starts with an overview of basic concepts in strategic planning, information technology strategy, and information security strategy. A practical guide to defining an information security strategy is then provided, covering the "nuts and bolts" of defining long-term information security goals that effectively protect information resources. Separate chapters covering technology strategy and management strategy clearly demonstrate that both are essential, complementary elements in pro ecting information.

Following this practical introduction to strategy development, subsequent chapters cover the theoretical foundation of an information security strategy, including:

  • Examination of key enterprise planning models that correspond to different uses of information and different strategies for securing information
  • Review of information economics, an essential link between information security strategy and business strategy
  • Role of risk in building an information security strategy

Two separate case studies are developed, helping readers understand how the development and implementation of information security strategies can work within their own organizations.

This is essential reading for information security managers, information technology executives, and consultants. By linking information security to general management strategy, the publication is also recommended for nontechnical executives who need to protect the value and security of their o ganization's information.

  •   Click to expandTable of Contents

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Frontmatter

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      The prelims comprise:

      • Half Title

      • IEEE Press Editorial Board Page

      • Title

      • Copyright

      • Contents

      • List of Figures

      • Preface

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Introduction

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Strategy Overview

      • Strategy and Information Technology

      • Strategy and Information Security

      • An Information Security Strategic Planning Methodology

      • Theory and Practice

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Developing an Information Security Strategy

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Overview

      • An Information Security Strategy Development Methodology

      • Strategy Prerequisites

      • Preliminary Development

      • Formal Project Introduction

      • Fact Finding

      • Analysis Methods

      • Analysis Focus Areas

      • Draft Plan Presentation

      • Final Plan Presentation

      • Options for Plan Development

      • A Plan Outline

      • Selling the Strategy

      • Plan Maintenance

      • The Security Assessment and the Security Strategy

      • Strategy Implementation

      • Key Points

      • Plan Outline

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      The Technology Strategy

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Thinking About Technology

      • Planning Technology Implementation

      • Technology Forecasting

      • Technology Strategy Components

      • The Security Strategy Technical Architecture

      • Overall Technical Design

      • The Logical Technology Architecture

      • Specific Technical Components

      • Key Points

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      The Management Strategy

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Control Systems

      • Governance

      • An IT Management Model for Information Security

      • Policies, Procedures, and Standards

      • Assigning Information Security Responsibilities

      • Executive Roles

      • Organizational Interfaces

      • Information Security Staff Structure

      • Staffing and Funding Levels

      • Managing Vendors

      • Organizational Culture and Legitimacy

      • Training and Awareness

      • Key Points

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Case Studies

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Case Study 1¿¿¿¿¿¿-¿¿¿¿¿¿Singles Opportunity Services

      • Case Study 2¿¿¿¿¿¿-¿¿¿¿¿¿Rancho Nachos Mosquito Abatement District

      • Key Points

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Business and IT Strategy

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Introduction

      • Strategy and Systems of Management

      • Business Strategy Models

      • The Strategy of No Strategy

      • IT Strategy

      • So is IT really ?>strategic?>?

      • IT Strategy and Information Security Strategy

      • Key Points

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Information Economics

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Concepts of Information Protection

      • Information Ownership

      • From Ownership to Asset

      • Information Economics and Information Security

      • Information Protection or Information Stewardship?

      • Key Points

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Risk Analysis

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

      This chapter contains sections titled:

      • Compliance Versus Risk Approaches

      • The ?>Classic?> Risk Analysis Model

      • Newer Risk Models

      • Organizational Risk Cultures

      • Risk Averse, Risk Neutral, and Risk Taking Organizations

      • Strategic Versus Tactical Risk Analysis

      • When Compliance-based Models are Appropriate

      • Risk Mitigation

      • Key Points

      ]]> View full abstract»

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Notes and References

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters

    • Full text access may be available. Click article title to sign in or learn about subscription options.

      Index

      Copyright Year: 2006

      Wiley-IEEE Press eBook Chapters