Computer Security: 20 Things Every Employee Should Know

Front Cover
McGraw-Hill, 2004 - Computers - 51 pages
0 Reviews
Securing corporate resources and data in the workplace is everyone's responsibility. Corporate IT security strategies are only as good as the employee's awareness of his or her role in maintaining that strategy. This book presents the risks, responsibilities, and liabilities (known and unknown) of which every employee should be aware, as well as simple protective steps to keep corporate data and systems secure. Inside this easy-to-follow guide, you'll find 20 lessons you can use to ensure that you are doing your part to protect corporate systems and privileged data. The topics covered include: Phishing and spyware; Identity theft; Workplace access; Passwords viruses and malware'; Remote access; E-mail; Web surfing and Internet use; Instant messaging; Personal firewalls and patches; Hand-held devices; Data backup; Management of sensitive information; Social engineering tactics; and, Use of corporate resources. Ben Rothke, CISSP, CISM, is a New York City-based senior security consultant with ThruPoint, Inc. He has more than 15 years of industry experience in the area of information systems security and privacy.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Keep your password secure
5
Practice safe data transfer
11
Surf the Web wisely at work
17
Copyright

3 other sections not shown

Other editions - View all

Common terms and phrases

About the author (2004)

Ben Rothke, CISSP is a New York City based senior security consultant with ThruPoint, Inc. and has more than 15 years of industry experience in the area of information systems security. His areas of expertise are in PKI, HIPAA, 21 CFR Part 11, design & implementation of systems security, encryption, firewall configuration & review, cryptography and security policy development. Prior to joining ThruPoint, Ben was with Baltimore Technologies, Ernst & Young, and Citicorp, and has provided security solutions to many Fortune 500 companies. Ben is also the lead mentor in the ThruPoint, Inc. CISSP preparation program, preparing security professionals to take the rigorous CISSP examination. Ben has written numerous articles for such computer periodicals as the Journal of Information Systems Security, PC Week, Network World, Information Security, Secure Computing, Information Security Magazine, Windows NT Magazine, InfoWorld & the Computer Security Institute Journal.

Bibliographic information