Synopses & Reviews
READINGS AND CASES IN INFORMATION SECURITY: LAW AND ETHICS provides a depth of content and analytical viewpoint not found in many other books. Designed for use with any Cengage Learning security text or as a standalone professional reference, this book offers readers a real-life view of information security management, including the ethical and legal issues associated with various on-the-job experiences. Included are a wide selection of foundational readings and scenarios from a variety of experts to give the reader the most realistic perspective of a career in information security.
Synopsis
READINGS AND CASES IN INFORMATION SECURITY: LAW and ETHICS can be used to support several courses in the Information Security curriculum, including Incident Response, Disaster Recovery, Risk Management, Principles of Information Security, Ethics in Security, and Management of Information Security. The chapters are interspersed with both a variety of case problems designed to stimulate in class and written discussions.
About the Author
Michael Whitman, Ph.D., CISM, CISSP, is a professor of information systems and security in the CSIS department at Kennesaw State University, where he also serves as director of the KSU Center for Information Security Education and coordinator for the Bachelor of Science in Information Security and Assurance program. Dr. Whitman is an active researcher in information security, fair and responsible use policies, ethical computing, and information systems research methods. He currently teaches graduate and undergraduate courses in information security and data communications and is an active member of the Computer Security Institute, the Information Systems Security Association, the Georgia Electronic Commerce Association's Information Security Working Group, the Association for Computing Machinery, and the Association for Information Systems. Dr. Whitman has published articles in the industry's top journals and co-authored a number of books in the field published by Course Technology. Herbert Mattord, M.B.A., CISM, CISSP, gained 24 years of IT industry experience as an application developer, database administrator, project manager, and information security practitioner before joining the faculty at Kennesaw State University in 2002. During his career as an IT practitioner, Mattord served as manager of corporate information technology security at Georgia-Pacific Corporation, where he acquired much of the practical knowledge presented in this textbook. He currently teaches undergraduate courses in information security, data communications, local area networks, database technology, project management, and systems analysis and design. Mattord also serves as coordinator for the Bachelor of Business Administration and Certificate in Information Security and Assurance programs, as well as operations manager of the KSU Center for Information Security Education and Awareness. Mattord is the co-author of several books published by Course Technology and is an active researcher in information security management topics.
Table of Contents
Part I: PREFACE and INTRODUCTION. Part II: RUNNING CASE: INTRODUCTION AND BACKGROUND. Part III: PERSONNEL and PRIVACY. Reading: Data Privacy: Is it Possible? John H. Nugent, Texas Women's University, Case: Technology Department and a Human Resources Department: A Case Study and Analysis. Jeffrey M. Stanton. Syracuse University. Case: IT Ethics and Security in an IT Certification Project. Jeffrey P. Landry, University of South Alabama. J. Harold Pardue, University of South Alabama. Reading: An Etymological View of Ethical Hacking. Michael Whitman, Kennesaw State University. Running Case. Part IV: RISK MANAGEMENT. Reading: CYBER Insurance and Residual Information Risk Management Tridib Bandyopadhyay, Kennesaw State University. Paper: Rethinking Risk-based Security. Herbert Mattord, Kennesaw State University. Case: Video Maze. Patricia Morrison, Cape Breton University. Running Case. Part V: MANAGEMENT OF SECURITY TECHNOLOGY. Reading: Cryptography Algorithms Standards: A Guideline for Management. Wasim A Al-Hamdani, Kentucky State University. Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy Tridib Bandyopadhyay, Kennesaw State University. Case: Advanced Topologies, Inc. Reading: Web Applications: Vulnerabilities and Remediation Shankar Babu Chebrolu, Cisco Systems Vinay K. Bansal, Cisco Systems. Reading: Managing Secure Database Systems Li Yang, University of Tennessee at Chattanooga.Running Case. Part VI: INFORMATION SECURITY PROGRAM MANAGEMENT. Case: Legal and Ethical Issues in Information Security Metrics Jennifer L. Bayuk, Stevens Institute of Technology, School of Systems and Enterprises. Reading: Impact of Incomplete or Missing Information in a Security Policy Wasim A Al-Hamdani, Kentucky State University Wendy Dixie, Kentucky State University. Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security Jeffrey P. Landry, University of South Alabama. Case: The Law in Information Security Management Katherine H. Winters, University of Tennessee at Chattanooga. Running Case. Part VII: REGULATORY COMPLIANCE MANAGEMENT. Reading: Security Compliance Auditing: Review and Research Directions Guillermo A. Francia, III, Jacksonville State University Jeffrey S. Zanzig, Jacksonville State University. Reading: Global Information Security Regulations, Case Studies and Cultural Issues Guillermo A. Francia, III, Jacksonville State University Andrew P. Ciganek, Jacksonville State University. Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study. Divakaran Liginlal, University of South Alabama, Lara Z. Khansa, Virginia Polytechnic Institute and State University, Jeffrey P. Landry, University of South Alabama. Running Case.