Cover image for Enterprise information security and privacy
Title:
Enterprise information security and privacy
Publication Information:
London : Artech House, 2009
Physical Description:
xxiv, 231 p. : ill. ; 24 cm.
ISBN:
9781596931909

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010196806 HF5548.37 E57 2009 Open Access Book Book
Searching...

On Order

Summary

Summary

Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps you understand what really needs to be done to protect sensitive data and systems and how to comply with the burgeoning roster of data protection laws and regulations. The book examines the effectiveness and weaknesses of current approaches and guides you towards practical methods and doable processes that can bring about real improvement in the overall security environment. You gain insight into the latest security and privacy trends, learn how to determine and mitigate risks, and discover the specific dangers and responses regarding the most critical sectors of a modern economy.


Author Notes

C. Warren Axelrod is the research director for financial services for the U.S. Cyber Consequences Unit and an executive adviser to the Financial Services Technology Consortium Previously, he was the chief privacy officer and business information security officer for U.S. Trust. He has been a senior information technology executive in financial services for more than 25 years, has contributed to numerous conferences and seminars, and has published extensively. Dr. Axelrod is the author of Outsourcing Information Security (Artech House, 2004). He holds a Ph.D. in managerial economics from Cornell University and a B.Sc. in electrical engineering and an M.A. in economics and statistics from Glasgow University. He is certified as a CISSP and CISM.
Jennifer L. Bayuk is an independent consultant on topics including information security policy, process, management, and metrics. Ms. Bayuk has been a chief information officer at a major financial firm, a manager of information systems auditing, a Big 4 security consultant and auditor, and a security software engineer at AtT Bell Laboratories. She is a well-published author and holds masters' degrees in computer science and philosophy.
Daniel Schutzer is the executive director of the Financial Services Technology Consortium (FSTC), responsible for its day-to-day operation. He is also a member of the BITS Advisory Council, an ASC X9 board member and a fellow of the New York Academy of Sciences. He was previously a director and senior vice president of Citigroup for over 23 years. Dr. Schutzer holds an M.S.E.E. and a Ph.D. from Syracuse University and a B.S.E.E. from City College of New York. He has authored more than 65 publications and 7 books.


Table of Contents

Forewordp. xiii
Prefacep. xix
Acknowledgmentsp. xxiii
Part I Trendsp. 1
1 Privacy Roles and Responsibilitiesp. 3
1.1 Backgroundp. 4
1.2 Observationsp. 8
1.3 Recommendationsp. 12
1.3.1 Roles and Responsibilities of Information Securityp. 14
1.3.2 The Impact of Outsourcing: Privacy, Security, and Enforcing Controlsp. 16
1.3.3 Privacy and New Roles for Information Securityp. 16
1.4 Future Trendsp. 18
2 Data Protectionp. 21
2.1 Backgroundp. 21
2.2 Observationsp. 24
2.3 Recommendationsp. 27
2.3.1 Formalize a Trust Modelp. 28
2.3.2 Utilize an Integrated and Holistic Approach to Security and Governancep. 30
2.3.3 Implement a Risk-Based Systemic Security Architecturep. 32
2.3.4 Support an Adaptive Security Approach to Securityp. 36
2.3.5 Build Systems, Applications, Networks, Protocols, and Others Using Accepted Standardsp. 37
2.4 Future Trendsp. 40
3 IT Operational Pressures on Information Securityp. 41
3.1 Backgroundp. 41
3.1.1 It Operations and It Service Development Impede Information Security Goalsp. 42
3.1.2 Information Security Impedes It Operations and It Service Development Goalsp. 43
3.1.3 Information Security Using a Technology-Centric, Bottom-Up Risk Modelp. 44
3.2 Observationsp. 45
3.3 Recommendationsp. 48
3.3.1 Stabilize the Patient and Get Plugged into Productionp. 51
3.3.2 Find Business Risks, Identify Controls, and Fix Fragile Artifactsp. 53
3.3.3 Implement Development and Release Controlsp. 55
3.3.4 Continually Improvep. 56
3.4 Future Trendsp. 57
4 Information Classificationp. 59
4.1 Backgroundp. 60
4.2 Observationsp. 62
4.3 Recommendationsp. 65
4.4 Future Trendsp. 69
5 Human Factorsp. 71
5.1 Backgroundp. 72
5.1.1 Historical Perspective on Privacyp. 73
5.1.2 Impact of Technology on Privacyp. 74
5.1.3 Privacy in a Corporate Settingp. 76
5.1.4 Evolution of Personal Informationp. 76
5.2 Observationsp. 77
5.2.1 Privacy Trade-offs-Human Behavioral Impact on Privacyp. 77
5.2.2 What is Risk?p. 80
5.3 Recommendationsp. 83
5.4 Future Trendsp. 87
Acknowledgmentsp. 87
Part II Risksp. 89
6 Making the Case for Replacing Risk-Based Securityp. 91
6.1 Introductionp. 92
6.1.1 Understanding Security Riskp. 92
6.2 Why Risk Assessment and Risk Management Failp. 95
6.2.1 Misplaced Support for Risk-Based Security in Practicep. 97
6.2.2 Alternatives to Security Risk Assessmentp. 99
6.3 Conclusionp. 101
7 The Economics of Lossp. 103
7.1 Security as the Prevention of Lossp. 104
7.2 Quantifying the Risk of Lossp. 105
7.3 Refining the Basic Risk Equationp. 106
7.4 The Problem of Quantifying Loss Itselfp. 106
7.5 Confronting the Reality of Hypothetical Actionsp. 107
7.6 Overcoming the Fixation on Assetsp. 108
7.7 Overcoming the Fixation on Market Valuep. 108
7.8 Overcoming the Fixation on Productivityp. 110
7.9 Overcoming the Neglect of Substitutesp. 111
7.10 Taking Account of the Duration and Extent of the Effectsp. 112
7.11 Distinguishing Between the Different Business Categories of Attacksp. 113
7.12 Putting the Proper Risk Estimates Back into the ROI Calculationp. 114
8 Legal and Regulatory Obligationsp. 115
8.1 The Expanding Duty to Provide Securityp. 116
8.1.1 Where Does It Come From?p. 116
8.1.2 What Is Covered?p. 118
8.2 The Emergence of a Legal Standard for Compliancep. 120
8.2.1 The Developing Legal Definition of "Reasonable Security"p. 122
8.2.2 An Increasing Focus on Specific Data Elements and Controlsp. 128
8.3 The Imposition of a Duty to Warn of Security Breachesp. 131
8.3.1 The Basic Obligationp. 132
8.3.2 International Adoptionp. 134
8.4 Conclusionp. 135
9 Telecommunicationsp. 137
9.1 Security Issues in Mobile Telecommunicationsp. 138
9.1.1 Pressure on the Perimeter Modelp. 138
9.1.2 Computer Security Threats for Portable Devicesp. 139
9.2 Security Issues in Global Telecommunicationsp. 140
9.2.1 Global Cooperation on Cyber Attackp. 140
9.2.2 Global Attention to Software Piracyp. 141
9.3 Security Issues in Internet Protocol-Based Telecommunicationsp. 141
9.3.1 Reduced Technological Diversityp. 142
9.3.2 Increased Reliance on Shared, Decentralized Internet-Based Systemsp. 142
9.4 Security Issues in Bandwidth-Increasing Telecommunicationsp. 143
9.4.1 Residential Users Have Greater Security Responsibilityp. 143
9.4.2 Botnets Become a Huge Threat to the Global Economyp. 144
Referencesp. 146
Part III Experiencep. 147
10 Financial Servicesp. 149
10.1 Laws, Regulations, and Supervisory Requirementsp. 150
10.1.1 Gramm-Leach-Bliley Act of 1999p. 153
10.1.2 The Sarbanes-Oxley Act of 2002p. 154
10.1.3 The Fair and Accurate Credit Transactions Act of 2003p. 154
10.1.4 Breach Notification Requirementsp. 155
10.1.5 Supervisory Guidancep. 158
10.2 Future Focusp. 160
10.2.1 Identity Theft Preventionp. 160
10.2.2 Outsourcing and Offshoringp. 160
10.2.3 Cross-Border Data Flowsp. 161
10.2.4 Encryptionp. 161
10.2.5 Online Behavioral Advertisingp. 162
10.2.6 Internet Governancep. 162
10.2.7 Wireless Securityp. 162
10.2.8 Capital Requirements for Operational Riskp. 162
10.2.9 Security of Web-Based Business Applicationsp. 163
10.2.10 Other Future Focuses in Financial Sector Securityp. 163
10.3 Compliance Challengesp. 163
11 Energyp. 165
11.1 Overview of Sectorp. 166
11.2 Risks Related to Security and Privacyp. 169
11.3 How Risks Are Addressedp. 171
11.4 Documentation and Its Relation to Information Securityp. 174
11.5 Conclusionp. 177
Acknowledgmentsp. 178
Selected Bibliographyp. 178
12 Transportation Securityp. 181
12.1 Overviewp. 182
12.2 Technology's Role in Transportation Securityp. 183
12.3 Security in Transitp. 187
12.4 Best Practices Appliedp. 189
13 Academiap. 191
13.1 Overviewp. 192
13.1.1 Age and Demographicsp. 192
13.1.2 You Cannot Fire Mep. 192
13.1.3 Hard to Educate Usersp. 192
13.1.4 Lax Controlsp. 193
13.1.5 How Everything Is Connectedp. 193
13.2 Case Studiesp. 193
13.2.1 Case Study: Social Networking and Crimewarep. 194
13.2.2 Case Study: Social Phishingp. 196
13.2.3 Case Study: Infected Access Pointsp. 196
13.3 Protectionp. 197
Referencesp. 197
Appendix A Key Information Security Law Referencesp. 199
A.1 Federal Statutesp. 199
A.2 State Statutesp. 200
A.3 Federal Regulationsp. 204
A.4 State Regulationsp. 206
A.5 Court Decisionsp. 206
A.6 FTC Decisions and Consent Decreesp. 207
A.7 State Attorneys General Consent Decreesp. 208
A.8 European Union-Directivesp. 209
A.9 European Union-Security Provisions in Country Implementations of Data Protection Directivep. 209
A.10 Other Countriesp. 212
About the Authorsp. 213
Indexp. 223