, , , , e.a.

Defending the Digital Frontier – Practical Security for Management 2e

Practical Security for Management

Gebonden Engels 2004 2e druk 9780471680871
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Enhance the digital security knowledge–base within any organization

In today′s competitive business environment, information and information technology have become crucial for a company′s success. Ensuring the confidentiality of such information–financial, trade secrets, and the like–has become key. Defending the Digital Frontier, Second Edition describes where organizations are vulnerable and identifies protective measures that rely on people and process as much as technology. This book is a practical guide aimed at business leaders and executives, explaining why digital security is not a technical function, but a risk management operation, and illustrates an approach for creating an enterprise–wide security culture based on business–led risk–management principles.

Ernst & Young is a global leader in professional services, providing tax, assurance, and transaction advice to thousands of individuals as well as domestic and global businesses. Ernst & Young provides independent security solutions for some of the world′s most information–intensive organizations, including numerous Fortune 500 companies, and the federal government.

Specificaties

ISBN13:9780471680871
Taal:Engels
Bindwijze:gebonden
Aantal pagina's:254
Druk:2

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

List of Figures and Tables.
<p>Foreword.</p>
<p>Preface.</p>
<p>Acknowledgments.</p>
<p>PART ONE: THE CHALLENGE OF THE FRONTIER.</p>
<p>Chapter 1: Living at the Digital Frontier.</p>
<p>Chapter 3: Organisational Components and Security Objectives.</p>
<p>PART TWO: THE AGENDA FOR ACTION.</p>
<p>Chapter 4: The Security Agenda.</p>
<p>Chapter 5: The Security Life Cycle.</p>
<p>PART THREE: THE APPROACH FOR SAFETY.</p>
<p>Chapter 6: The Security Culture.</p>
<p>Chapter 7: The Risk Frontier.</p>
<p>Chapter 8: Road Map for Success.</p>
<p>Appendix A: Security–Related Laws and Regulations.</p>
<p>Appendix B: Threat Vectors.</p>
<p>Appendix C: Ernst &amp; Young 2004 Digital Security Overview: An Executive Guide and Diagnostic.</p>
<p>Endnotes.</p>
<p>Glossary of Digital Security Terminology.</p>
<p>Index.</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Defending the Digital Frontier – Practical Security for Management 2e