Information Security: Policy, Processes, and Practices (Google eBook)
Continuing the tradition of Journal of Management Information Systems, this strictly refereed series of research volumes offers an unparalleled lasting record of the field of Information Systems. Featuring brand new material specifically written for this series, each volume presents both knowledge aboutorganizational systems, and methods for creating new knowledge in the discipline. To further the field¿s continuing development, the series is designed to serve researchers as well as practitioners. AMIS publishes several topical volumes each year, edited by leading authorities in the various subfields of IS.
What people are saying - Write a review
accessed on September activities APEC approach attacks BCP/DR beneﬁts best practices business continuity planning CareLog centralized CERT/CC chapter COBIT compliance components computer security conﬁdentiality controls Convention on Cybercrime crime CSIRTs cyber security cybercrime decentralized deﬁned deﬁnition difﬁcult document effective EISP employees end users ensure environment evaluation example federal ﬁnancial ﬁrm ﬁrst ﬁve framework goals governance guidelines identiﬁed impact implementation individual inﬂuence information assets information security management information security policy information security strategy Information Systems information technology InfoSec infrastructure Internet issues law enforcement mechanisms monitoring NIST OECD operations organization organizational outsourcing personnel phishing planning problem procedures protection recovery requirements response risk analysis risk assessment risk management risk treatment safeguards security abuse incidents signiﬁcant speciﬁc stakeholders standards strategy-setting process Straub structure technical threats tion ubicomp ubicomp applications ubiquitous computing vulnerabilities