Product Cover Image

Information Security: Principles and Practices, 2nd Edition

By Mark S. Merkow, Jim Breithaupt

Published by Pearson IT Certification

Published Date: Jun 4, 2014


Information Security: Principles and Practices, Second Edition

Everything You Need to Know About Modern Computer Security, in One Book

Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK].

Thoroughly updated for today’s challenges, technologies, procedures, and best practices.

The perfect resource for anyone pursuing an IT security career.


Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today’s Information Security Common Body of Knowledge.


Two highly experienced security practitioners have brought together all the foundational knowledge you need to succeed in today’s IT and business environments. They offer easy-to-understand, practical coverage of topics ranging from security management and physical security to cryptography and application development security.


This edition fully addresses new trends that are transforming security, from cloud services to mobile applications, “Bring Your Own Device” (BYOD) strategies to today’s increasingly rigorous compliance requirements. Throughout, you’ll find updated case studies, review questions, and exercises–all designed to reveal today’s real-world IT security challenges and help you overcome them.


Learn how to

-- Recognize the evolving role of IT security

-- Identify the best new opportunities in the field

-- Discover today’s core information security principles of success

-- Understand certification programs and the CBK

-- Master today’s best practices for governance and risk management

-- Architect and design systems to maximize security

-- Plan for business continuity

-- Understand the legal, investigatory, and ethical requirements associated with IT security

-- Improve physical and operational security

-- Implement effective access control systems

-- Effectively utilize cryptography

-- Improve network and Internet security

-- Build more secure software

-- Define more effective security policies and standards

-- Preview the future of information security



Table of Contents


Chapter 1: Why Study Information Security?


The Growing Importance of IT Security and New Career Opportunities

    An Increase in Demand by Government and Private Industry

Becoming an Information Security Specialist

    Schools Are Responding to Demands

    The Importance of a Multidisciplinary Approach

Contextualizing Information Security

    Information Security Careers Meet the Needs of Business


Chapter 2: Information Security Principles of Success


Principle 1: There Is No Such Thing As Absolute Security

Principle 2: The Three Security Goals Are Confidentiality, Integrity, and Availability

    Integrity Models

    Availability Models

Principle 3: Defense in Depth as Strategy

Principle 4: When Left on Their Own, People Tend to Make the Worst Security Decisions

Principle 5: Computer Security Depends on Two Types of Requirements: Functional and Assurance

Principle 6: Security Through Obscurity Is Not an Answer

Principle 7: Security = Risk Management

Principle 8: The Three Types of Security Controls Are Preventative, Detective, and Responsive

Principle 9: Complexity Is the Enemy of Security

Principle 10: Fear, Uncertainty, and Doubt Do Not Work in Selling Security

Principle 11: People, Process, and Technology Are All Needed to Adequately Secure a System or Facility

Principle 12: Open Disclosure of Vulnerabilities Is Good for Security!


Chapter 3: Certification Programs and the Common Body of Knowledge


Certification and Information Security

International Information Systems Security Certifications Consortium (ISC)2

The Information Security Common Body of Knowledge

    Information Security Governance and Risk Management

    Security Architecture and Design

    Business Continuity and Disaster Recovery Planning

    Legal Regulations, Investigations, and Compliance

    Physical (Environmental) Security

    Operations Security

    Access Control


    Telecommunications and Network Security

    Software Development Security

Other Certificate Programs in the IT Security Industry

    Certified Information Systems Auditor

    Certified Information Security Manager

    Certified in Risk and Information Systems Control

    Global Information Assurance Certifications

     (ISC)2 Specialization Certificates

    CCFP: Certified Cyber Forensics Professional

    HCISPP: HealthCare Information Security and Privacy Practitioner

    Vendor-Specific and Other Certification Programs


Chapter 4: Governance and Risk Management


Security Policies Set the Stage for Success

Understanding the Four Types of Policies

    Programme-Level Policies

    Programme-Framework Policies

    Issue-Specific Policies

    System-Specific Policies

Developing and Managing Security Policies

    Security Objectives

    Operational Security

    Policy Implementation

Providing Policy Support Documents


    Standards and Baselines



Suggested Standards Taxonomy

    Asset and Data Classification

    Separation of Duties

    Employment Hiring Practices

    Risk Analysis and Management

    Education, Training, and Awareness

Who Is Responsible for Security?


Chapter 5: Security Architecture and Design


Defining the Trusted Computing Base

    Rings of Trust

Protection Mechanisms in a TCB

System Security Assurance Concepts

    Goals of Security Testing

    Formal Security Testing Models

The Trusted Computer Security Evaluation Criteria

    Division D: Minimal Protection

    Division C: Discretionary Protection

    Division B: Mandatory Protection

    Division A: Verified Protection

    The Trusted Network Interpretation of the TCSEC

    The Information Technology Security Evaluation Criteria

    Comparing ITSEC to TCSEC

    ITSEC Assurance Classes

The Canadian Trusted Computer Product Evaluation Criteria

The Federal Criteria for Information Technology Security

The Common Criteria

    Protection Profile Organization

    Security Functional Requirements

    Evaluation Assurance Levels

The Common Evaluation Methodology

Confidentiality and Integrity Models

    Bell-LaPadula Model

    Biba Integrity Model

    Advanced Models


Chapter 6: Business Continuity Planning and Disaster Recovery Planning


Overview of the Business Continuity Plan and Disaster Recovery Plan

    Why the BCP Is So Important

    Types of Disruptive Events

    Defining the Scope of the BCP

    Creating the Business Impact Analysis

Disaster Recovery Planning

    Identifying Recovery Strategies

    Understanding Shared-Site Agreements

    Using Alternate Sites

    Making Additional Arrangements

    Testing the DRP


Chapter 7: Law, Investigations, and Ethics


Types of Computer Crime

How Cybercriminals Commit Crimes

The Computer and the Law

    Legislative Branch of the Legal System

    Administrative Branch of the Legal System

    Judicial Branch of the Legal System

Intellectual Property Law

    Patent Law


    Trade Secrets

Privacy and the Law

    International Privacy Issues

    Privacy Laws in the United States

Computer Forensics

The Information Security Professional’s Code of Ethics

Other Ethics Standards

    Computer Ethics Institute

    Internet Activities Board: Ethics and the Internet

    Code of Fair Information Practices


Chapter 8: Physical Security Control


Understanding the Physical Security Domain

    Physical Security Threats

    Providing Physical Security


Chapter 9: Operations Security


Operations Security Principles

Operations Security Process Controls

Operations Security Controls in Action

    Software Support

    Configuration and Change Management


    Media Controls





Chapter 10: Access Control Systems and Methodology


Terms and Concepts



    Least Privilege (Need to Know)

    Information Owner

    Discretionary Access Control

    Access Control Lists

    Mandatory Access Control

    Role-Based Access Control

Principles of Authentication

    The Problems with Passwords

    Multifactor Authentication


Single Sign-On


    Federated Identities

Remote User Access and Authentication

    Remote Access Dial-In User Service

    Virtual Private Networks


Chapter 11: Cryptography


Applying Cryptography to Information Systems

Basic Terms and Concepts

Strength of Cryptosystems

    Cryptosystems Answer the Needs of Today’s E-Commerce

    The Role of Keys in Cryptosystems

Putting the Pieces to Work

    Digesting Data

    Digital Certificates

Examining Digital Cryptography

    Hashing Functions

    Block Ciphers

    Implementations of PPK Cryptography


Chapter 12: Telecommunications, Network, and Internet Security


An Overview of Network and Telecommunications Security

Network Security in Context

The Open Systems Interconnection Reference Model

    The Protocol Stack

    The OSI Reference Model and TCP/IP

    The OSI Model and Security

Data Network Types

    Local Area Networks

    Wide Area Networks




Protecting TCP/IP Networks

    Basic Security Infrastructures



    Intrusion Detection Systems

    Intrusion Prevention Systems

Virtual Private Networks


    Encapsulating Security Protocol

    Security Association

    Internet Security Association and Key Management Protocol

    Security Policies

    IPSec Key Management

    Applied VPNs

Cloud Computing


Chapter 13: Software Development Security


The Practice of Software Engineering

Software Development Life Cycles

Don’t Bolt Security On–Build It In

    Catch Problems Sooner Rather Than Later

    Requirements Gathering and Analysis

    Systems Design and Detailed Design

Design Reviews

    Development (Coding) Phase



    Security Training

Measuring the Secure Development Program

    Open Software Assurance Maturity Model (OpenSAMM)

    Building Security in Maturity Model (BSIMM)


Chapter 14: Securing the Future


Operation Eligible Receiver

Carders, Account Takeover, and Identity Theft

    Some Definitions

    ZeuS Banking Trojan

    Phishing and Spear Phishing

    Other Trends in Internet (In)Security

    The Year (Decade?) of the Breach

The Rosy Future for InfoSec Specialists


Appendix A: Common Body of Knowledge

Access Control

Telecommunications and Network Security

Information Security Governance and Risk Management

Software Development Security


Security Architecture and Design

Operations Security

Business Continuity and Disaster Recovery Planning

Legal Regulations, Investigations, and Compliance

Physical (Environmental) Security

Appendix B: Security Policy and Standards Taxonomy

Appendix C: Sample Policies

Sample Computer Acceptable Use Policy

    1.0.0 Acceptable Use Policy

Sample Email Use Policy

    1.0.0 Email Use Policy

Sample Password Policy

    1.0.0 Password Policy

Sample Wireless (WiFi) Use Policy

    1.0.0 Wireless Communication Policy

Appendix D: HIPAA Security Rule Standards

HIPAA Security Standards

Administrative Procedures

Physical Safeguards

Technical Security Services

Technical Security Mechanisms



9780789753250   TOC   5/7/2014


Purchase Info

ISBN-10: 0-7897-5325-1

ISBN-13: 978-0-7897-5325-0

Format: Book

$80.00 | Free Ground Shipping.

Add to Cart

Digital Choices ?

MyLab & Mastering with Pearson eText is a complete digital substitute for a print value pack at a lower price.

eBook (Watermarked) ?

Includes EPUB, MOBI, and PDF

This eBook includes the following formats, accessible from your Account page after purchase:

ePubEPUBThe open industry format known for its reflowable content and usability on supported mobile devices.

MOBIMOBIThe eBook format compatible with the Amazon Kindle and Amazon Kindle applications.

Adobe ReaderPDFThe popular standard, used most often with the free Adobe® Reader® software.

This eBook requires no passwords or activation to read. We customize your eBook by discreetly watermarking it with your name, making it uniquely yours.

MyLab & Mastering ?

MyLab & Mastering products deliver customizable content and highly personalized study paths, responsive learning tools, and real-time evaluation and diagnostics. MyLab & Mastering products help move students toward the moment that matters most—the moment of true understanding and learning.

eTextbook ?

With CourseSmart eTextbooks and eResources, you save up to 60% off the price of new print textbooks, and can switch between studying online or offline to suit your needs.

Once you have purchased your eTextbooks and added them to your CourseSmart bookshelf, you can access them anytime, anywhere.