Informacijska varnost: Razlika med redakcijama

Izbrisana vsebina Dodana vsebina
Plesek (pogovor | prispevki)
Brez povzetka urejanja
Plesek (pogovor | prispevki)
Brez povzetka urejanja
Vrstica 316:
====Poglejte si tudi====
 
{{Portal|Computer security}}
• Računalniška nesigurnost - Computer insecurity
* Računalniška varnostnesigurnost - [[Computer security insecurity]]
* Računalniška varnost - [[Computer security]]
• Informacijska zagotovila - Information Assurance
* [[Enterprise information security architecture]]
• Tehnologije za povečanje zasebnosti - Privacy enhancing technologies
* Brisanje podatkov - [[Data erasure]]
• Varnostne naprave - Security bug
* Enkripcija diska - [[Disk encryption]]
* [[Information assurance]]
* [[Information security audit]]
* [[Information Security Forum]]
* [[Information security governance]]
* [[Information security management]]
* [[Information security management system]]
* [[Information security policies]]
* [[Information security standards]]
* [[Information technology security audit]]
* [[ITIL security management]]
* Servisi za mrežno varnost[[Network Security Services]]
* Fizično varovanje informacij - [[Physical information security]]
* Tehnologije za povečevanje varnosti - [[Privacy enhancing technologies]]
* Varnostni servisi - [[Security-as-a-service]]
* Leveli obveščanja o varnostnih napakah - [[Security breach notification laws]]
* [[Security information management]]
* Informacijski varnostni akti - [[Security of Information Act]]
* Leveli upravljanja varnosti - [[Security level management]]
* Varnostni mehanizmi - [[Security bug]]
* Samostojni vpisi - [[Single sign-on]]
* Standardi dobre prakse - ''[[Standard of Good Practice]]''
* Verifikacije in ovrednotenje - [[Verification and validation]]
* Produkti za preprečevanje izgube podatkov - [[Data loss prevention products]]
 
== Osebe, ki delujejo na tem področju ==
*[[Stefan Brands]]
*[[Adam Back]]
*[[Lance Cottrell]]
*[[Ian Goldberg]]
*[[Peter Gutmann (computer scientist)|Peter Gutmann]]
*[[Bruce Schneier]]
 
====Čalnki====
 
<div style="font-size:90%;">
• Anderson, K., "IT Security Professionals Must Evolve for Changing Market", SC Magazine, October 12, 2006.
<references />
</div>
 
====Zunanje povezave====
 
*[http://msdn2.microsoft.com/en-us/library/ms998382.aspx patterns & practices Security Engineering Explained ]
*[http://www.opensecurityarchitecture.org Open Security Architecture- Controls and patterns to secure IT systems ]
*[http://www.logicalsecurity.com/resources/resources_articles.html Introduction to Security Governance ]
• An*[http://www.coesecurity.com/services/resources.asp IntroductionCOE toSecurity - Information Security Articles]
*[http://security.practitioner.com/introduction/ An Introduction to Information Security]
• Operations Security Professionals Association Website
*[http://www.davidstclair.co.uk/example-security-templates/example-internet-e-mail-usage-policy-2.html Example Security Policy]
• Institute of Information Security Professionals
*[http://www.iwar.org.uk/comsec/ IWS - Information Security Chapter]
• Information Systems Security Association
• Example Security Policy
• Secure Computing Magazine
• IWS - Information Security Chapter
• Information Security – From Chaos to Structure
 
====Literatura====
 
* {{cite book
Allen, Julia H. (2001). The CERT Guide to System and Network Security Practices. Boston, MA: Addison-Wesley. 0-201-73723-X.
| last = Allen
Krutz, Ronald L.; Russell Dean Vines (2003). The CISSP Prep Guide, Gold Edition, Indianapolis, IN: Wiley. 0-471-26802-X.
| first = Julia H.
Layton, Timothy P. (2007). Information Security: Design, Implementation, Measurement, and Compliance. Boca Raton, FL: Auerbach publications. 978-0-8493-7087-8.
| title = The CERT Guide to System and Network Security Practices
McNab, Chris (2004). Network Security Assessment. Sebastopol, CA: O'Reilly. 0-596-00611-X.
| publisher = Addison-Wesley
Peltier, Thomas R. (2001). Information Security Risk Analysis. Boca Raton, FL: Auerbach publications. 0-8493-0880-1.
| date = 2001
Peltier, Thomas R. (2002). Information Security Policies, Procedures, and Standards: guidelines for effective information security management. Boca Raton, FL: Auerbach publications. 0-8493-1137-3.
| location = Boston, MA
White, Gregory (2003). All-in-one Security+ Certification Exam Guide. Emeryville, CA: McGraw-Hill/Osborne. 0-07-222633-1.
| isbn = 0-201-73723-X }}
* {{cite book
| last = Krutz
| first = Ronald L.
| coauthors = Russell Dean Vines
| title = The CISSP Prep Guide
| edition = Gold Edition
| publisher = Wiley
| date = 2003
| location = Indianapolis, IN
| isbn = 0-471-26802-X }}
* {{cite book
| last = Layton
| first = Timothy P.
| title = Information Security: Design, Implementation, Measurement, and Compliance
| publisher = Auerbach publications
| date = 2007
| location = Boca Raton, FL
| isbn = 978-0-8493-7087-8 }}
* {{cite book
| last = McNab
| first = Chris
| title = Network Security Assessment
| publisher = O'Reilly
| date = 2004
| location = Sebastopol, CA
| isbn = 0-596-00611-X }}
* {{cite book
| last = Peltier
| first = Thomas R.
| title = Information Security Risk Analysis
| publisher = Auerbach publications
| date = 2001
| location = Boca Raton, FL
| isbn = 0-8493-0880-1 }}
* {{cite book
| last = Peltier
| first = Thomas R.
| title = Information Security Policies, Procedures, and Standards: guidelines for effective information security management
| publisher = Auerbach publications
| date = 2002
| location = Boca Raton, FL
| isbn = 0-8493-1137-3 }}
* {{cite book
| last = White
| first = Gregory
| title = All-in-one Security+ Certification Exam Guide
| publisher = McGraw-Hill/Osborne
| date = 2003
| location = Emeryville, CA
| isbn = 0-07-222633-1 }}
* {{cite book
| last = Dhillon
| first = Gurpreet
| title = Principles of Information Systems Security: text and cases
| publisher = John Wiley & Sons
| date = 2007
| location = NY
| isbn = 978-0471450566 }}