Logs, trees, forest : the big picture -- What is a log? -- Log data sources -- Log storage technologies -- Syslog-NG case study -- Covert logging -- Analysis goals, planning and preparation : what are we looking for? -- Simple analysis techniques -- Filtering, normalization, and correlation -- Statistical analysis -- Log data mining -- Reporting and summarization -- Visualizing log data -- Logg…
Pengelolaan teknologi informasi di berbagai organisasi merupakan salah satu bentuk perkembangan yang akan sangat membantu dan bermanfaat bukan hanya bagi perusahaan, namun juga bagi para stakeholder-nya. Tata kelola Teknologi informasi akan sangat membantu dalam berbagai hal, antara lain efisiensi, efektivitas, transparansi, hingga yang berhubungan dengan sumber daya manusia. Buku Perancangan T…
The motivation for writing this book is to share our knowledge, analyses, and conclusions about cybersecurity in particular and risk management in general to raise awareness among businesses, academics, and the general public about the cyber landscape changes and challenges that are occurring with emerging threats that will affect individual and corporate information security. As a result, the …
The goal of Rainer, Introduction to Information Systems 5e is to teach all business majors, especially undergraduate ones, how to use information technology to master their current or future jobs and to help ensure the success of their organization. To accomplish this goal, this text helps students to become informed users; that is, persons knowledgeable about information systems and informatio…
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection. Performed incorrectly, they can provide the false sense of security that allows potential threats to develop into disastrous losses of p…
Contents Part 1 Introduction 1 The exception manager: What you do, how you do it 2 2 Management theory: essential background for the successful manager Part 2 The environment of management 3 The manager’s changing work environment & ethical responsibilities: doing the right thing 4 Global management: managing across borders Part 3 Planning 5 Planning: the foundation of successfu…
Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure of this document 5 Background 6 Overview of the information security risk management process 7 Context establishment 8 Information security risk management 9 Information security risk treatment 10 Information security risk acceptance 11 Information security risk communication and consultati…
Contents 0 Introduction 1 Scope 2 Normative references 3 Terms and of this standard 4 Structure of this standard 5 Information security policies 6 Organization of information security 7 Humas resource security 8 Asset management 9 Access control 10 Cryptography 11 Physical and environmental security 12 Operations security 13 Communications security 14 System acquisition, devel…
Contents Introduction 1 Scope 2 Normative references 3 Terms and definitions 4 Structure and overview 5 Rationale 6 Characteristics 7 Types of measures 8 Processes Annex A (informative) an information security measurement model Annex B (informative) measurement construct examples Annex C (informative) an example of free-text form measurement construction Bibliography