fundamentals of information systems security 3rd edition

Fundamentals Of Information Systems Security 3rd Edition

The Fundamentals of Information Systems Security 3rd edition recently has revised and updated its data. There are major chapter changes that we’ll discuss below. To those who are aspiring on the field, this will guide you all throughout.

But first, what is the Fundamentals of Information Systems Security 3rd edition all about? Let’s just put it this way.

What Is It? 

The book provides a broad overview for those who pursue a career in information systems security. Yes, it speaks about the fundamental concepts in the field that the readers must know.

Main Updates – Overview

  • It introduces modern IOT risk threats and privacy matters.
  • Then, it speaks about data breaches and how to respond to them.
  • Also, there is current content on advanced malware and APT attacks.
  • The book update also involves coverages on recent compliance law and standards updates.
  • Then, it outlines fully the six main areas of the CompTIA Security+ SYO-401 Certification exam.

Major Chapter Changes 

Chapter 1

  • It welcomes you to the Internet of Things (IoT)
  • Also, it has updated to modern data breaches
  • Then, it emphasizes preventing data breaches 

Chapter 2

  • A new chapter on the IoT as well as the impact of security, compliance, and privacy has on it.
  • It also welcomes the union of business and personal communications and data 

Chapter 3

  • An update is found in terms of the content on malware and malicious software.
  • Also, it involves recent case studies of malware attacks.
  • Then, add the Next-generation advanced persistent threats (APT) topic.

Chapter 4

  • It has updates to compliance law content.
  • Moreover, there is new content on mobility and BYOD.
  • Also, new topics on the endpoint and device security. 

Chapter 5

  • It helps you with the latest access controls for operating systems today.
  • Broader coverages in biometrics. Also, the latest technology in access control. 

Chapter 6

  • This chapter talks about how data and process outsourcing affects security operations. Yes, it’s all about that.
  • It gives you more stress on the importance of including security ahead in the software development method. 

Chapter 7

  • Modern references and content in order to display the most advanced compliance requirements.
  • Also, it increases the emphasis on evaluating security controls for compliance. 

Chapter 8

  • There are new risk management definitions as well as issues in a single chapter.
  • It has updates on content and examples to address recovery issues. 

Chapter 9

  • Latest trends in cryptography from academia and industry.
  • Also, it includes more discussions of cryptography basics and implementation. 

Chapter 10

  • Latest network rules and practical applications.
  • Then, this chapter includes the latest wireless network and network device progress. 

Chapter 11

  • More focus on the most advanced malware types.
  • And, more details on the most typical malware intrusions. 

Chapter 12

  • It has the latest information security standards. 

Chapter 13

  • There are updates on education, training, and certification programs in ISS.
  • Also, for undergraduate and graduate degree programs in CIA. 

Chapter 14

  • There are updates on US Federal Government Department of Defense standards.
  • Then, updates to various professional certification programs.

Chapter 15

  • Updates to US-based compliance laws.
  • New content on FISMA 2014.
  • New content on PCI DSS v3.2.

Leave a Comment

Your email address will not be published. Required fields are marked *