Informacijska varnost: Razlika med redakcijama
Izbrisana vsebina Dodana vsebina
Brez povzetka urejanja |
Brez povzetka urejanja |
||
Vrstica 316:
====Poglejte si tudi====
{{Portal|Computer security}}
* Računalniška varnost - [[Computer security]]
* [[Enterprise information security architecture]]
* Brisanje podatkov - [[Data erasure]]
* Enkripcija diska - [[Disk encryption]]
* [[Information assurance]]
* [[Information security audit]]
* [[Information Security Forum]]
* [[Information security governance]]
* [[Information security management]]
* [[Information security management system]]
* [[Information security policies]]
* [[Information security standards]]
* [[Information technology security audit]]
* [[ITIL security management]]
* Servisi za mrežno varnost[[Network Security Services]]
* Fizično varovanje informacij - [[Physical information security]]
* Tehnologije za povečevanje varnosti - [[Privacy enhancing technologies]]
* Varnostni servisi - [[Security-as-a-service]]
* Leveli obveščanja o varnostnih napakah - [[Security breach notification laws]]
* [[Security information management]]
* Informacijski varnostni akti - [[Security of Information Act]]
* Leveli upravljanja varnosti - [[Security level management]]
* Varnostni mehanizmi - [[Security bug]]
* Samostojni vpisi - [[Single sign-on]]
* Standardi dobre prakse - ''[[Standard of Good Practice]]''
* Verifikacije in ovrednotenje - [[Verification and validation]]
* Produkti za preprečevanje izgube podatkov - [[Data loss prevention products]]
== Osebe, ki delujejo na tem področju ==
*[[Stefan Brands]]
*[[Adam Back]]
*[[Lance Cottrell]]
*[[Ian Goldberg]]
*[[Peter Gutmann (computer scientist)|Peter Gutmann]]
*[[Bruce Schneier]]
====Čalnki====
<div style="font-size:90%;">
<references />
</div>
====Zunanje povezave====
*[http://security.practitioner.com/introduction/ An Introduction to Information Security]
*[http://www.davidstclair.co.uk/example-security-templates/example-internet-e-mail-usage-policy-2.html Example Security Policy]
*[http://www.iwar.org.uk/comsec/ IWS - Information Security Chapter]
====Literatura====
* {{cite book
| last = Allen
| first = Julia H.
| title = The CERT Guide to System and Network Security Practices
| publisher = Addison-Wesley
| date = 2001
| location = Boston, MA
| isbn = 0-201-73723-X }}
* {{cite book
| last = Krutz
| first = Ronald L.
| coauthors = Russell Dean Vines
| title = The CISSP Prep Guide
| edition = Gold Edition
| publisher = Wiley
| date = 2003
| location = Indianapolis, IN
| isbn = 0-471-26802-X }}
* {{cite book
| last = Layton
| first = Timothy P.
| title = Information Security: Design, Implementation, Measurement, and Compliance
| publisher = Auerbach publications
| date = 2007
| location = Boca Raton, FL
| isbn = 978-0-8493-7087-8 }}
* {{cite book
| last = McNab
| first = Chris
| title = Network Security Assessment
| publisher = O'Reilly
| date = 2004
| location = Sebastopol, CA
| isbn = 0-596-00611-X }}
* {{cite book
| last = Peltier
| first = Thomas R.
| title = Information Security Risk Analysis
| publisher = Auerbach publications
| date = 2001
| location = Boca Raton, FL
| isbn = 0-8493-0880-1 }}
* {{cite book
| last = Peltier
| first = Thomas R.
| title = Information Security Policies, Procedures, and Standards: guidelines for effective information security management
| publisher = Auerbach publications
| date = 2002
| location = Boca Raton, FL
| isbn = 0-8493-1137-3 }}
* {{cite book
| last = White
| first = Gregory
| title = All-in-one Security+ Certification Exam Guide
| publisher = McGraw-Hill/Osborne
| date = 2003
| location = Emeryville, CA
| isbn = 0-07-222633-1 }}
* {{cite book
| last = Dhillon
| first = Gurpreet
| title = Principles of Information Systems Security: text and cases
| publisher = John Wiley & Sons
| date = 2007
| location = NY
| isbn = 978-0471450566 }}
|