Security Controls for Sarbanes-Oxley Section 404 IT Compliance -... - Librairie Eyrolles
Tous nos rayons

Déjà client ? Identifiez-vous

Mot de passe oublié ?

Nouveau client ?

CRÉER VOTRE COMPTE
Security Controls for Sarbanes-Oxley Section 404 IT Compliance
Ajouter à une liste

Librairie Eyrolles - Paris 5e
Indisponible

Security Controls for Sarbanes-Oxley Section 404 IT Compliance

Security Controls for Sarbanes-Oxley Section 404 IT Compliance

Authorization, Authentication, and Access

Dennis C. Brewer - Collection Networking/Security

262 pages, parution le 17/11/2005

Résumé

Your step-by-step guide to creating authentication processes that assure compliance

To comply with Sarbanes-Oxley Section 404, you must design an information technology infrastructure that can protect the privacy and access integrity of your data, particularly online, while not restricting business activity. This book shows you how to do that, explaining what you need to know every step of the way.

  • Recognize eight concepts that constitute privacy of information
  • Apply the security basics-identification, authentication, authorization, access control, administration, auditing, and assessment
  • Use features already present in directory technology, directory schema, and meta-synchronization to improve security profiles
  • Integrate a security architecture into legacy, current, and future applications
  • Create security domain definitions that will stop data predators cold

L'auteur - Dennis C. Brewer

Dennis C. Brewer is IT Security Solutions Specialist for the Information Technology Department of the State of Michigan. His responsibilities include identity management and privacy protection initiatives for the state.

Sommaire

  • About the Author
  • Acknowledgments
  • Introduction
  • The Role of Information Technology Architecture in Information Systems Design
  • Understanding Basic Concepts of Privacy and Data Protection
  • Defining and Enforcing Architecture
  • Combining External Forces, Internal Influences, and IT Assets
  • Simplifying the Security Matrix
  • Developing Directory-Based Access Control Strategies
  • Integrating the Critical Elements
  • Engineering Privacy Protection into Systems and Applications
  • The Value of Data Inventory and Data Labeling
  • Putting It All Together in the Web Applications Environment
  • Why Federated Identity Schemes Fail
  • A Pathway to Universal Two-Factor Authentication
  • Appendix A: WWW Resources for Authentication, Authorization, and Access Control News and Information
  • Appendix B: Important Access Control and Security Terms
  • Appendix C: Critical Success Factors for Controls Design
  • Appendix D: Sample Policy Statements for Compulsory Access and Security Controls
  • Appendix E: Documentation Examples
  • Appendix F: Sample Job Description for Directory Engineer/Schema Architect
  • Index
Voir tout
Replier

Caractéristiques techniques

  PAPIER
Éditeur(s) Wiley
Auteur(s) Dennis C. Brewer
Collection Networking/Security
Parution 17/11/2005
Nb. de pages 262
Format 19 x 23,5
Couverture Broché
Poids 445g
Intérieur Noir et Blanc
EAN13 9780764598388
ISBN13 978-0-7645-9838-8

Avantages Eyrolles.com

Livraison à partir de 0,01 en France métropolitaine
Paiement en ligne SÉCURISÉ
Livraison dans le monde
Retour sous 15 jours
+ d'un million et demi de livres disponibles
satisfait ou remboursé
Satisfait ou remboursé
Paiement sécurisé
modes de paiement
Paiement à l'expédition
partout dans le monde
Livraison partout dans le monde
Service clients sav@commande.eyrolles.com
librairie française
Librairie française depuis 1925
Recevez nos newsletters
Vous serez régulièrement informé(e) de toutes nos actualités.
Inscription