Contents to look for in an information security management handbook

An information security management handbook has many domain covered in it. Moreover it is also useful for the persons who are attending the certification examination on security management. The book is structured in such a way that is easy to access the required content faster. It is always better to look for the latest edition of the book since it contains many updated information on the field.

The domains that are covered in an information security management handbook are access control, communications security, risk management, business continuity planning, policies and standards. Some of the other domain other than these includes computer architecture and system security, law, investigation and ethics, application program security, cryptography, operations security, and physical security.


In the access control domain coverage, the topics include the principles and the objectives of the access control and the type of security controls along with the purpose of security management. The issues pertaining to access control are also covered that include biometric identification. In communication security, the objective, threats and countermeasures are dealt with. A topic on self-hack audit is also available. The security model for the networks and the internet would be useful and subsequently internet security management with internet firewalls is also dealt with.


Risk Management domain includes topics such as risk analysis, assessment of risk in different environments such as distributed environments and the impact of those risks on the business. Policies, standards and organization deserve a separate domain. Topics on policy development, organization architecture, and model for IP practitioners are helpful. A topic on enterprise security architecture would be apt in this domain.

Computer architecture and system security chapter includes topics on microcomputer and LAN security and systems architecture. Chapter on Law and Investigation include topics on abuse methods for computer and how to detect them. The state and federal laws pertaining to computer crimes are also dealt with this chapter.


These are some of the chapters that a user might expect in an information security management handbook. Other topics of importance are added periodically in successive editions and hence it is useful to update your editions of handbook.

| Contents to look for in an information security management handbook | Making use of the information management network for business success | Operational benefits of strategic information management | Principles involved in implementing business information management | The need for information risk management | What is the need for a proper information management strategy |


FREE Subscription

Stay Current With the Latest Trends & Developments Realted to Management. Signup for Our Newsletter and Receive New Articles Through Email

Note: We never rent, trade, or sell our email lists to anyone. We assure that your privacy is respected and protected.