Skip to content

Readings and Cases in Information Security : Law and Ethics

Best in textbook rentals since 2012!

ISBN-10: 1435441575

ISBN-13: 9781435441576

Edition: 2011

Authors: Michael E. Whitman, Herbert J. Mattord

List price: $66.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $66.95
Copyright year: 2011
Publisher: Course Technology
Publication date: 6/23/2010
Binding: Paperback
Pages: 352
Size: 7.25" wide x 9.25" long x 0.50" tall
Weight: 1.254
Language: English

Michael E. Whitman, Ph.D, CISM, CISSP, is a professor of information security and director of the Coles Center for Information Security Education at Kennesaw State University (KSU) in Kennesaw, GA. With over 12 years of experience designing and implementing information security curriculum and over 20 years of experience teaching and researching at the university level, Dr. Whitman has served as a consultant to several Fortune 1000 organizations, the United States Government, and the State of Georgia on issues related to information security. He has authored several textbooks in information security including Principles of Information Security and Management of Information Security,…    

Herbert J. Mattord, Ph.D, CISM, CISSP, teaches courses in Information Security and Assurance at Kennesaw State University (KSU) in Kennesaw, GA. He is the associate director of the KSU Center for Information Security Education (infosec.kennesaw.edu), as well as the coordinator for the KSU Information Security and Assurance and Information Systems programs of study. He completed 26 years of IT industry experience before becoming a full-time academic in 2002. His experiences as an application developer, database administrator, project manager, and information security practitioner are a valuable background to his teaching role at KSU. While engaged in his IT career, he worked as an adjunct…    

Preface & Introduction
Running Case: Introduction and Background
Personnel & Privacy
Reading: Data Privacy: Is it Possible
Case: Technology Department and a Human Resources Department: A Case Study and Analysis
Case: IT Ethics and Security in an IT Certification Project
Reading
An Etymological View of Ethical Hacking
Running Case
Risk Management
Reading
CYBER Insurance and Residual Information Risk Management
Paper: Rethinking Risk-based Security
Case: Video Maze
Running Case
Management of Security Technology
Reading: Cryptography Algorithms Standards: A Guideline for Management
Reading: Cyber Terrorism: Impacts, Vulnerabilities, and U.S. Policy
Case: Advanced Topologies, Inc
Reading: Web Applications: Vulnerabilities and Remediation
Reading: Managing Secure Database Systems
Running Case
Information Security Program Management
Case: Legal and Ethical Issues in Information Security Metrics
Reading: Impact of Incomplete or Missing Information in a Security Policy
Case: Using Laws for Federal Agencies to Investigate Legal and Ethical Management of Information Security
Case: The Law in Information Security Management
Running Case
Regulatory Compliance Management
Reading: Security Compliance Auditing: Review and Research Directions
Reading: Global Information Security Regulations, Case Studies and Cultural Issues
Case: Collaboration and Compliance in Healthcare: A Threat Modeling Case Study
Running Case