Managing Risk: Technology and Communications
Taylor & Francis, 2004 - Business & Economics - 209 pages
Managing Risk: Technology and Communications is a practical guide to the effective management of technology and communications risks. Frequent high profile scares, like the Sasser worm and WiFi vulnerabilities, make a proactive approach essential and this book shows you how to put in place expedient checks, balances and countermeasures.
Business networks are threatened by a host of factors, from employee abuse to non-compliance with data protection and libel laws, from hacker attacks to viruses and from extortion and terrorism to natural disaster.
The costs of failing to manage systems risks can be immense and go beyond simple loss of productivity or even fraudulent losses to brand damage, theft of business secrets, expensive litigation, diminished customer confidence and adverse impacts on personnel and share value. This practical handbook includes examples, checklists and case studies to help you manage such hazards.
The book covers:
┐ accessibility of information;
┐ acceptable use of information;
┐ directors┐ legal duties;
┐ general legal compliance;
┐ protecting networks from external and internal threats;
┐ encouraging security awareness at management and employee level;
┐ reputational risk management; and
┐ national and international risk and security standards.
Managing Risk: Technology and Communications is the indispensable work of reference for IT and technology managers, HR managers, IT legal advisors, company secretaries and anyone seeking practical guidance on technology risks and their management.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Chapter I Security Why Bother?
Chapter 2 Risks to the Network
Chapter 3 EmployeeRelated Risk
Chapter 4 TransactionRelated Risk
Chapter 5 Online Reputational Risk
Chapter 6 Other Communications Risks
Chapter 7 Managing Operational ICT Risk with Standards and Best Practice
Other editions - View all
apply assets beneﬁt breach business continuity plan certiﬁcate Commissioner communications company’s comply conﬁdentiality connection consent contract court cybersmearing damage data controller Data Protection Act data protection principles data subject deﬁned Demon Internet Ltd digital signature directors documents domain name e-commerce electronic money employees encryption enforcement notice ensure European Economic Area example ﬁles ﬁnancial ﬁrewall ﬁrst guidelines hackers identiﬁed implement individual information security information systems infringement Internet issues laptop marketing message board metatags mitigate monitoring National Computing Centre notiﬁcation regulations offence ofﬁce operational organisation organisation’s outsourcing paid for placement passwords personal data purposes relation relevant request result RFID risk assessment risk management search engines server signature signiﬁcant spam speciﬁed staff standards subsection telephone third party trademark transactions unauthorised users viruses warchalking Whilst wireless LANs