Presents an overview of information systems security, offering the basic underpinnings of information security and concluding with an analysis of risk management. This book offers ways to accurately map information flow in computer and telecom systems. It also explains how to apply the methodology to individual system components and subsystems.