๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Enterprise Information Security: Information Security For Non-technical Decision Makers

โœ Scribed by Peter Gregory


Publisher
Financial Times Management
Year
2003
Tongue
English
Leaves
167
Series
Executive Briefings
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Information security has existed as a formal discipline since the mainframe era. Infosec, as it is sometimes called, has evolved over time and has spawned a number of formal methodologies. Universities and corporate research and development have developed several security models that have been used as a design basis for access control and trust mechanisms.

Written in user-friendly terms, but using a vocabulary that security practitioners also understand, this briefing will enable the reader to get to grips with security issues so they can make informed decisions on threats and risks facing their business.

Contents include: Security is on center stage, Threats and Vulnerabilities, Security Fundamentals - The Principles and the Mechanisms Behind Them, Security Policies and Requirements - Defining the Standard of Architecture and Behavior, Security is About People's Behavior, Protecting Corporate Information Beyond the Corporate Boundaries, Privacy, Action Items.


๐Ÿ“œ SIMILAR VOLUMES


Information Security Governance Framewor
โœ Andrej Volchkov ๐Ÿ“‚ Library ๐Ÿ“… 2019 ๐Ÿ› Auerbach Publications ๐ŸŒ English

This book presents a framework to model the main activities of information security management and governance. The same model can be used for any security sub-domain such as cybersecurity, data protection, access rights management, business continuity, etc.

Decision Making and Security Risk Manage
โœ Wadii Boulila (editor), Jawad Ahmad (editor), Anis Koubaa (editor), Maha Driss ( ๐Ÿ“‚ Library ๐Ÿ“… 2024 ๐Ÿ› Springer ๐ŸŒ English

<span>This book contains contemporary research that outlines and addresses security, privacy challenges and decision-making in IoT environments. The authors provide a variety of subjects related to the following Keywords: IoT, security, AI, deep learning, federated learning, intrusion detection syst

Enterprise Information Security and Priv
โœ Warren C. Axelrod, Jennifer L. Bayuk, Daniel Schutzer ๐Ÿ“‚ Library ๐Ÿ“… 2009 ๐ŸŒ English

Here's a unique and practical book that addresses the rapidly growing problem of information security, privacy, and secrecy threats and vulnerabilities. This authoritative resource helps professionals understand what really needs to be done to protect sensitive data and systems and how to comply wit

Enterprise Information Systems Assurance
โœ Merrill Warkentin, Rayford B. Vaughn ๐Ÿ“‚ Library ๐Ÿ“… 2006 ๐Ÿ› Idea Group Publishing ๐ŸŒ English

Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges in the IT field - how to create secure environments for the application of technology to serve future needs. This book br