Achieving and Sustaining Secured Business Operations: An Executive’s Guide to Planning and Management
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Berkeley, CA
Apress
[2017]
|
Schlagwörter: | |
Links: | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030121388&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | xviii, 168 Seiten Illustrationen |
ISBN: | 9781484230985 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV044725214 | ||
003 | DE-604 | ||
005 | 20180308 | ||
007 | t| | ||
008 | 180122s2017 xx a||| |||| 00||| eng d | ||
020 | |a 9781484230985 |9 978-1-4842-30985 | ||
035 | |a (OCoLC)1024133325 | ||
035 | |a (DE-599)BVBBV044725214 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-355 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
100 | 1 | |a Ajmani, Neelesh |e Verfasser |4 aut | |
245 | 1 | 0 | |a Achieving and Sustaining Secured Business Operations |b An Executive’s Guide to Planning and Management |c Neelesh Ajmani, Dinesh Kumar |
264 | 1 | |a Berkeley, CA |b Apress |c [2017] | |
300 | |a xviii, 168 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer science | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computer Science | |
650 | 4 | |a Systems and Data Security | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Kumar, Dinesh |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-4842-3099-2 |
856 | 4 | 2 | |m Digitalisierung UB Regensburg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030121388&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030121388 |
Datensatz im Suchindex
_version_ | 1819274676973600768 |
---|---|
adam_text | Table of Contents
About the Authors............................................... vii
About the Technical Reviewer..................................... ix
Acknowledgments............................................. xi
Introduction................................................... xiii
Chapter 1: Current Practices........................................1
Information Security, a Growth Industry?..........................1
State of the Business.............................................2
State of the Security Practices...................................3
Anything Wrong with the Current State?............................5
Transforming Fear Into Confidence and Advantage.........-.........7
Chapter 2: Next Practices: Business-Centric Security and Risk
Management....................................................... »9
Business State....................................................9
Security as a Competitive Differentiation........................11
Secured Business Operations, an Organizational Capability........13
Achieving and Sustaining Secured Business Operations.............18
Manufacturing Organization (B2B Engagement Model)................27
Health Care Organization (Digital Business)......................30
Achieving and Sustaining Secured Business Operations in Your Organization...32
111
TABLE OF CONTENTS
Chapter 3: Secured Business Model.....................................35
Achieving and Sustaining Secured Business Operations Starts with Business....35
Secured Business Model and Five Ps...................................36
Secured Business Model Capability Maturity Levels as a Value Road Map.45
Secured Business Model Is a Bridge Between Business Engagement
and Operating Model................................!..................47
Chapter 4: Secured Operating Model................................... 49
Realizing Secured Business Operations................................49
Components of Secured Operating Model................................51
Business Management..................................................54
Operations Management................................................56
Risk Management......................................................58
Compliance Controls..................................................60
Master Data Management...............................................61
Data Definition...................................................62
Data Integrity....................................................63
Data Security.....................................................63
Data Services.....................................................64
Data Architecture.................................................64
Infrastructure Management............................................66
Practices for Secured Operating Model................................68
Business Management: Change Management............................69
Business Management: Governance...................................70
Business Management: KPI Measurements.............................72
Operations Management: Process Management.........................74
Operations Management: Access Control Management..................75
Operations Management: Audit and Monitoring.......................77
Risk Management: Threat Management................................78
IV
TABLE OF CONTENTS
Risk Management: Vulnerability Management.........................79
Risk Management: Exception Management.............................79
Compliance Controls: Data Security................................80
Compliance Controls: Segregation of Duties........................80
Master Data Management: Identity Management.......................81
Master Data Management: Asset Management..........................82
Master Data Management: Role Management...........................82
Master Data Management: Policy Management.........................83
Master Data Management: Dependency Management.....................84
Master Data Management: Glossary Management.......................86
Master Data Management: Life-Cycle Management.....................87
Infrastructure Management: Network Management.....................88
Infrastructure Management: Data Center Management.................89
Infrastructure Management: Application Management.................90
Using Secured Operating Model........................................91
Chapter 5: Secured Management Model....................................93
Sustaining Secured Business Operations...............................93
Components of Secured Management Model...............................95
ASSESS............................................................96
PLAN..............................................................96
IMPROVE...........................................................96
MANAGE ...........................................................97
Key Management Practices............................................100
Assess Process Domain Practices..................................100
Plan Process Domain Practices....................................104
Improve Process Domain Practices.................................113
Manage Process Domain Practices..................................116
Conclusion..........................................................121
V
TABLE OF CONTENTS
Chapter 6: Security Effectiveness.........................................123
Current State of Measures.............................................. 123
Effectiveness Defined...................................................125
What Is An Organization Trying to Achieve?............................126
What Is An Acceptable Cost for the Organization?......................127
What Is Effective?...................................................128
Why Are Security Efforts Perceived as Not Effective or Too Expensive?.129
Principles of Security Effectiveness....................................131
Becoming Effective with Value Flow Map...................................134
Doing Right with Business Mindset.......................................137
Measuring Change and Outcomes...........................................139
Key Measures for Security Effectiveness.................................139
Measure to Manage.......................................................141
Chapter 7: Making It Real........................................... ..143
What Have We Learned?...................................................143
What Has Been Done?.....................................................150
Technology Manufacturing Company Open for Business...................152
Leading Health-Care Provider Expanding Globally......................153
A Service Provider Merging with Another Service Provider..............154
A Hospital Network Optimizing Cost and Maximizing Care................155
What Can You Do?........................................................156
Approach for Adopting and Operationalizing the Framework.............157
Index.....................................................................159
vi
|
any_adam_object | 1 |
author | Ajmani, Neelesh Kumar, Dinesh |
author_facet | Ajmani, Neelesh Kumar, Dinesh |
author_role | aut aut |
author_sort | Ajmani, Neelesh |
author_variant | n a na d k dk |
building | Verbundindex |
bvnumber | BV044725214 |
classification_rvk | QP 345 |
ctrlnum | (OCoLC)1024133325 (DE-599)BVBBV044725214 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01653nam a2200409zc 4500</leader><controlfield tag="001">BV044725214</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180308 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">180122s2017 xx a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781484230985</subfield><subfield code="9">978-1-4842-30985</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1024133325</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044725214</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ajmani, Neelesh</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Achieving and Sustaining Secured Business Operations</subfield><subfield code="b">An Executive’s Guide to Planning and Management</subfield><subfield code="c">Neelesh Ajmani, Dinesh Kumar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berkeley, CA</subfield><subfield code="b">Apress</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xviii, 168 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Systems and Data Security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Dinesh</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-4842-3099-2</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Regensburg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030121388&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030121388</subfield></datafield></record></collection> |
id | DE-604.BV044725214 |
illustrated | Illustrated |
indexdate | 2024-12-20T18:10:01Z |
institution | BVB |
isbn | 9781484230985 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030121388 |
oclc_num | 1024133325 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR |
owner_facet | DE-355 DE-BY-UBR |
physical | xviii, 168 Seiten Illustrationen |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Apress |
record_format | marc |
spellingShingle | Ajmani, Neelesh Kumar, Dinesh Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management Computer science Computer security Computer Science Systems and Data Security Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4274324-2 |
title | Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management |
title_auth | Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management |
title_exact_search | Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management |
title_full | Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management Neelesh Ajmani, Dinesh Kumar |
title_fullStr | Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management Neelesh Ajmani, Dinesh Kumar |
title_full_unstemmed | Achieving and Sustaining Secured Business Operations An Executive’s Guide to Planning and Management Neelesh Ajmani, Dinesh Kumar |
title_short | Achieving and Sustaining Secured Business Operations |
title_sort | achieving and sustaining secured business operations an executive s guide to planning and management |
title_sub | An Executive’s Guide to Planning and Management |
topic | Computer science Computer security Computer Science Systems and Data Security Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer science Computer security Computer Science Systems and Data Security Computersicherheit |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030121388&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ajmanineelesh achievingandsustainingsecuredbusinessoperationsanexecutivesguidetoplanningandmanagement AT kumardinesh achievingandsustainingsecuredbusinessoperationsanexecutivesguidetoplanningandmanagement |