Available:*
Library | Item Barcode | Call Number | Material Type | Item Category 1 | Status |
---|---|---|---|---|---|
Searching... | 30000010059312 | TK5105.59 V64 2004 | Open Access Book | Book | Searching... |
Searching... | 30000010059052 | TK5105.59 V64 2004 | Open Access Book | Book | Searching... |
On Order
Summary
Summary
This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices--obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.
Table of Contents
I Digital Liabilities And Risk Management |
1 Security in a Globally Connected Economy |
2 Sources of Digital Liability |
3 Threats, Vulnerabilities, and Risk Exposure |
4 An Affirmative Model of Defense: Digital Liability Management |
5 Models for Estimating Risk and Optimizing the Return on Security Investment |
II Policies, Practices, And Defensive Technology |
6 Acceptable Use Policies: Human Defenses |
7 Secure Use Practices: Defensive Best Practices |
8 Technology and Auditing Systems: Hardware and Software Defenses |
III Computer Forensics, Electronic Evidence, Fraud, And Computer Crime Laws |
9 Electronic Evidence, Electronic Records Management, and Computer Forensics |
10 Computer Crime, Computer Fraud, and Cyber Terrorism |
Appendix: USA PATRIOT Act |
IV Privacy |
11 Privacy and Data Protection |
Appendix: HIPAA |
Glossary of Technology and Legal Terms |
Abbreviations and Acronyms |
References |
Online References |
Subject Index |