ИНФОРМАЦИОННАЯ БЕЗОПАСНОСТЬ

Важна ли эта тема для Вас?


  • Total voters
    423

vadim-kiev

New member
Joined
Jul 20, 2005
Messages
4
Reaction score
0
Location
kiev
Кто то может поткинуть что то по теме
,, Проблемы защиты информации на предприятии''?
 

Agran

Member
Joined
Apr 4, 2004
Messages
5
Reaction score
26
Age
50
Очень советую посмотреть еще на один стандарт. Ничуть не хуже, а может даже лучше 17799 и 27001 ;-)


The Standard of Good Practice for Information Security


standard2.jpg


The Standard of Good Practice for Information Security is designed to help any organisation, irrespective of market sector, size or structure, keep the business risks associated with its information systems within acceptable limits. It is a major tool in improving the quality and efficiency of security controls applied by an organisation.

The Standard is based on over 16 years and US $75 million of investment in practical research and draws on the knowledge and experiences of the Information Security Forum's global members as well as building on other standards such as ISO 17799 and COBIT.

The Standard has been produced by the Information Security Forum (ISF), an international association of over 270 of the world's leading organisations which fund and co-operate in the development of a practical research programme in information security and best practices in IT security and information risk management. The ISF's work probably represents the most comprehensive and integrated set of reports anywhere in the world regarding the process of managing information risk.

Здесь
(6565 KB)
 
Last edited by a moderator:

Koshechka

Member
Joined
May 30, 2005
Messages
7
Reaction score
6
Age
43
Location
Украина
Изменение в политику размещения файлов на Рапиде.

Agran said:
Типовая политика ИБ компании малого и среднего бизнеса (1091 KB):
http://rapidshare.de/files/19677597/PIB.rar.html

Практическое применение международного стандарта безопасности информационных систем ISO 17799 (1170 KB)
http://rapidshare.de/files/19680880/ISO.rar.html

Анализ информационных рисков компании (3018 KB)
http://rapidshare.de/files/19681416/Risk_analysis.rar.html

Коммерческая тайна (401 KB)
http://rapidshare.de/files/19681727/KT.rar.html

Практическое руководство по основам правовой защиты информации, включая сборник правовых и технических документов (597 KB)
http://rapidshare.de/files/19681903/Law_appliance.rar.html

Безопасное WEB-программирование (538 KB)
http://rapidshare.de/files/19682275/Web-application.rar.html
Здравствуйте уважаемые форумчане. Не было бы уместным такое количество небольших архивов запаковывать в один. Таким образом не пришлось бы ждать 60 минут после каждого скачаннога с Рапиды? Заранее благодарен за внесение изменений в политику размещения файлов на рапиде. С уважением Schizo.
 

IgorOk

Member
Joined
Feb 8, 2004
Messages
163
Reaction score
179
Koshechka said:
Здравствуйте уважаемые форумчане. Не было бы уместным такое количество небольших архивов запаковывать в один. Таким образом не пришлось бы ждать 60 минут после каждого скачаннога с Рапиды? Заранее благодарен за внесение изменений в политику размещения файлов на рапиде. С уважением Schizo.

Думаю, уместнее было бы иметь и общий и такие малые архивы.
 

Vik_63

Member
Joined
Nov 14, 2005
Messages
24
Reaction score
10
Location
Москва
Website
asher.ru
vadim-kiev said:
Кто то может поткинуть что то по теме
,, Проблемы защиты информации на предприятии''?
Есть только
«Алгоритм противодействия действиям злоумышленника на примере произвольного здания, с комплексной системой охраны.»

Создание КСЗИ на произвольном объекте, которым был выбран архив МВД. Курсач писал с реального объекта, но, конечно, не с архива МВД.
Здесь
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
daniyl said:
2 okun:
Пожалуйста ещё раз выложи:

"КУРС «БЕЗОПАСНОСТЬ ИНФОРМАЦИОННЫХ ТЕХНОЛОГИЙ»"
и
"Защита персональных данных: Опыт правового регулирования"
рапида говорит - файлы удалены...

Заранее благодарю.
daniyl, ссылки обновлены
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Защита компьютерной информации
Учебное пособие

А.В. ТЕРЕХОВ, В.Н. ЧЕРНЫШОВ,
А.В. СЕЛЕЗНЕВ, И.П. РАК
Издательство ТГТУ, Тамбов
ИСБН 5-8265-0228-2
2003. 80 с.
Формат: pdf

В пособии рассмотрены правовые аспекты защиты компьютерной информации, а также программно-технические средства и приемы работы с ними, позволяющие обеспечить защиту на достаточном уровне.
Пособие предназначено для студентов специальности 021100 «Юриспруденция».

Здесь (0,61 Мб)
Зеркало
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Информационная безопасность и защита информации
в корпоративных сетях железнодорожного транспорта

Учебное пособие для ВУЗов ж.-д. транспорта

Яковлев В.В., Корниенко А.А.
М.: УМК МПС России, 2001
Формат: doc + vcd

В учебнике последовательно изложены тенденции, принципы и средства сетевой интеграции на железнодорожном транспорте, методология защиты информации и обеспечения информационной безопасности корпоративных сетей, рассмотрены основные методы и средства защиты телекоммуникационных сетей и информационных систем железнодорожного транспорта.
Предназначен для студентов ВУЗов железнодорожного транспорта. Может быть полезен аспирантам информационных специальностей и специальностей в области информационной безопасности, а также инженерам-разработчикам информационных систем и телекоммуникационных сетей, систем обеспечения их информационной безопасности.

Здесь (1,6 Мб)
Зеркало
 

Agran

Member
Joined
Apr 4, 2004
Messages
5
Reaction score
26
Age
50
Отличная книга по управлению информационной безопасностью на предприятии. Очень понравился предложенный автором системный подход к вопросу построения и управления системой информационной безопасности.

Mission-Critical Security Planner: When Hackers Won't Take No for an Answer

book3.gif


Book Description

Shows step-by-step how to complete a customized security improvement plan, including analyzing needs, justifying budgets, and selecting technology, while dramatically reducing time and cost.
Includes worksheets at every stage for creating a comprehensive security plan meaningful to management and technical staff.
Uses practical risk management techniques to intelligently assess and manage the network security risks facing your organization.
Presents the material in a witty and lively style, backed up by solid business planning methods.
Companion Web site provides all worksheets and the security planning template

Здесь (1450 KB)
 

vadim-kiev

New member
Joined
Jul 20, 2005
Messages
4
Reaction score
0
Location
kiev
Если у когото есть курсовик на тему
Информационная безопасность на предприятии, выложите пожалоста...
 

ja_tak

New member
Joined
Oct 27, 2004
Messages
4
Reaction score
0
Age
41
Кто-нибудь нашел РУС перевод ISO 17799:2005???
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
ja_tak, см. 3 стр.
 

Bersarea

Member
Joined
Sep 10, 2004
Messages
8
Reaction score
7
Комрады :) нужна рыба по следующей теме: "Регламент реагирования на инциденты информационной безопасности" - то бишь несанкционированное подключение компа в сети с левым MAC (IP), противоречивые действия инсайдера ну и так далее.
Мол обнаружил, подбежал, пальцы отрубил и докладную написал :)
Уже неделю думаю и не знаю с чего подступиться :( - Если инфа секретна - хотя бы через ПМ.
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Critical Incident Management

cover1mq.jpg


Alan B. Sterneckert
Auerbach Publications © 2004 (552 pages)
ISBN:084930010X
Формат: chm

Аннотация:

Most businesses are aware of the danger posed by malicious network intruders and other internal and external security threats. Unfortunately, in many cases the actions they have taken to secure people, information and infrastructure from outside attacks are inefficient or incomplete. Responding to security threats and incidents requires a competent mixture of risk management, security policies and procedures, security auditing, incident response, legal and law enforcement issues, and privacy.

Critical Incident Management presents an expert overview of the elements that organizations need to address in order to prepare for and respond to network and information security violations. Written in a concise, practical style that emphasizes key points, this guide focuses on the establishment of policies and actions that prevent the loss of critical information or damage to infrastructure.

CTOs, CFOs, Chief Legal Officers, and senior IT managers can rely on this book to develop plans that thwart critical security incidents. And if such incidents do occur, these executives will have a reference to help put the people and procedures in place to contain the damage and get back to business.

Здесь (2.56 Мб) pass: http://netz.ru
Зеркало
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Hack I.T.: Security Through Penetration Testing

0201719568.01.lzzzzzzz.jpg


T. J. Klevinsky, Scott Laliberte, Ajay Gupta
First Edition February 01, 2002
ISBN: 0-201-71956-8, 544 pages
Формат: chm

Preface:
Why write a book about hacking? The question is really whether a book about the techniques and tools used to break into a network would be beneficial to the information security community. We, the authors, believe that penetration testing is a valuable and effective means of identifying security holes and weaknesses in a network and computing environment. Understanding how others will try to break into a network offers considerable insight into the common pitfalls and misconfigurations that make networks vulnerable. This insight is essential to creating a comprehensive network security structure.

Some may argue that providing this penetration-testing information gives script kiddies and hackers ammunition to better attack systems. However, script kiddies and hackers already have access to this information or have the time to find it—most of the material presented in this book is available from a variety of sources on the Internet. The problem is that the system and security administrators defending against attacks do not have the time or resources to research the sites necessary to compile this information. We decided to write this book to provide defenders with the information hackers already have. A hacker has to find only one hole to gain unauthorized access. The security group defending against the hackers needs to find all the holes to prevent unauthorized access.

There is no tried-and-true training that can make everyone a security expert, but there are some baseline principles, skills, and tools that must be mastered to become proficient in this field. Our goal is to provide you with those skills in a manner that helps you to understand the structure and tools used and to begin developing your own style of penetration testing.

The process described in this book is not the only way to perform a penetration test. We continue to evolve our own methodology to respond to new technologies and threats. This process has worked well for us in the past and continues to be a successful way to evaluate and test network security.

Здесь. (4,58 Мб) pass: http://netz.ru
Зеркало
 

okun

Cryptographer
Joined
May 3, 2014
Messages
6,047
Reaction score
2,975
Deposit
$ 500
Invasion of Privacy: Big Brother and the Company Hackers

cover1xe.jpg


Michael J. Weber
Premier Press © 2004 (275 pages)
ISBN:1592000436
Формат: chm

Introduction
I thought I knew something about technology when I started writing this. Perhaps I did, but over the course of my research the world changed, I changed, and technology changed perhaps more than anything else. One dollar invested in the NASDAQ when my research began was worth about 19 cents by the time I got around to writing about the Internet boom (and bust). When I began this investigation the greatest threat to technology was the Y2K bug. Now it's cyber-terrorism!

The list is a long one. Denial-of-service attacks (DDoS) and killer Internet worms like Nimda, Code Red, and MSBlast were virtually unheard of when I began my research. I'm not one hundred percent certain, but to the best of my knowledge the phrase "identity theft" did not yet exist.

While I researched this book, the tech boom fizzled, the Internet bubble burst, the NASDAQ collapsed, and Al Qaeda attacked America on September 11, 2001. In essence, this book is about the technological and legal ramifications of all that. What I fear most from the fallout has been dubbed "the death of privacy" by noted law professor and cyber-privacy expert A. Michael Froomkin. The institutions and corporations we trust most have begun hacking us, suggests Froomkin in his article entitled "The Death of Privacy?" published in the Stanford Law Review.

Big business and Big Brother are the biggest hackers of all! Technology has become a nasty business. You know what I'm talking about: pop-up ads, cookies, spyware, spam, junk faxes, junk mail, telemarketing calls. You're a target and your personal information is a commodity! It is systematically harvested by information brokers with vast databases that do nothing but spit out computer profiles 24 hours a day. A nice fat dossier all about you is available for under a hundred bucks at your friendly neighborhood information broker! Unfortunately, most people don't realize that.

Technology, advertising, the media, and government have converged to invade our privacy. This book exposes the dangers (Part I) and proposes a practical defense.

Здесь (9,96 Мб) pass: http://netz.ru
Зеркало
 
Top