Role engineering for enterprise security management
Edward J. Coyne.
- Boston: Artech House Publishers, 2008.
- xvii, 224p.
HB
Whether you are a manager, engineer, or IT security specialist, this authoritative resource shows you how to define and deploy roles for securing enterprise systems. Written by leading authorities in the field, the book explains how you can build a business case, identify risks, determine project costs, and fully plan and staff a role engineering effort. You find practical techniques that meaningfully define roles and ensure proper assignment of permissions and roles to users. The book presents tools that enable you to capture permissions and user assignments from existing systems, and analyze user and permission data in scenarios simulating actual system use. Moreover, this practical reference helps you evaluate these tools and decide which ones are right for your own role engineering program. The book also shows how to verify that role structures comply with security policies. You find tips and insights from real-world projects that guarantee you engineer roles strategically and securely.
Eng
9781596932180
Computer networking & communications. Data security & data encryption. Management information systems. Technology & Engineering. Computers - Computer Security. Science/Mathematics. Computers / Security / General. Information Management. Security - General. Electricity. Access control. Computer network architectures. Computer networks. Information resources management. Computer Communications & Networking.