Application Security In The Iso27001 Environment


Download Application Security In The Iso27001 Environment PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Application Security In The Iso27001 Environment book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages.

Download

Application security in the ISO27001:2013 Environment


Application security in the ISO27001:2013 Environment

Author: Vinod Vasudevan

language: en

Publisher: IT Governance Ltd

Release Date: 2015-10-15


DOWNLOAD





Application Security in the ISO 27001:2013 Environment explains how organisations can implement and maintain effective security practices to protect their web applications – and the servers on which they reside – as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO 27001. The book describes the methods used by criminal hackers to attack organisations via their web applications and provides a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO 27001. Product overviewSecond edition, updated to reflect ISO 27001:2013 as well as best practices relating to cryptography, including the PCI SSC’s denigration of SSL in favour of TLS.Provides a full introduction to ISO 27001 and information security management systems, including implementation guidance.Describes risk assessment, management and treatment approaches.Examines common types of web app security attack, including injection attacks, cross-site scripting, and attacks on authentication and session management, explaining how each can compromise ISO 27001 control objectives and showing how to test for each attack type.Discusses the ISO 27001 controls relevant to application security.Lists useful web app security metrics and their relevance to ISO 27001 controls.Provides a four-step approach to threat profiling, and describes application security review and testing approaches.Sets out guidelines and the ISO 27001 controls relevant to them, covering:input validationauthenticationauthorisationsensitive data handling and the use of TLS rather than SSLsession managementerror handling and loggingDescribes the importance of security as part of the web app development process

Application Security in the ISO27001 Environment


Application Security in the ISO27001 Environment

Author: Vinod Vasudevan

language: en

Publisher: It Governance Limited

Release Date: 2008-03


DOWNLOAD





Application security is a major issue for CIOs. Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001. It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001. Together, the authors offer a wealth of expertise in ISO27001 information security, risk management and software application development. Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines. As well as showing how to use ISO27001 to secure individual applications, the book demonstrates how to tackle this issue as part of the development and roll out of an organisation-wide Information Security Management System conforming to the Standard. Software packages are the conduits to critical business data, thus securing applications adequately is of the utmost importance.

Application Security in the ISO 27001:2013 Environment


Application Security in the ISO 27001:2013 Environment

Author: Vinod Vasudevan

language: en

Publisher:

Release Date: 2015


DOWNLOAD





This book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO27001. Methods used by criminal hackers to attack organisations via their web applications and a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO27001 are provided. This edition is updated to reflect ISO27001:2013 as well as best practices relating to cryptography, including the PCI SSC's denigration of SSL in favour of TLS. --