𝔖 Bobbio Scriptorium
✦   LIBER   ✦

IT SECURITY OUTSOURCING: HOW SAFE IS YOUR IT SECURITY?

✍ Scribed by Colette Fenn; Robert Shooter; Ken Allan


Publisher
Elsevier Science
Year
2002
Tongue
English
Weight
56 KB
Volume
18
Category
Article
ISSN
0267-3649

No coin nor oath required. For personal study only.

✦ Synopsis


The 'Information Security Survey 2001' (published by Ernst & Young) found that 66% of respondent companies were fearful about inadequate IT security and claimed this was the single biggest inhibitor to the expansion of electronic commerce. Their insecurity would appear fully justified when you consider that 75% of them had experienced critical breaches in their IT security over the past year. This article explores the business case for IT security outsourcing and looks at some of the contractual provisions that can make or break an effective outsourcing arrangement.


πŸ“œ SIMILAR VOLUMES


Need to justify IT security? Measure you
✍ Timothy Iijima; Jeffrey Curtis πŸ“‚ Article πŸ“… 2004 πŸ› John Wiley and Sons 🌐 English βš– 77 KB

## Abstract Most companies realize that IT‐related business risk is substantial. But few rigorously analyze and quantify that risk. So it's tough to justify a given expense for IT security. The authors show how to measure that riskβ€”and decide if your security actions are adequate. __Β© 2004 Wiley Pe

Managing network security: How does a ty
✍ Fred Cohen πŸ“‚ Article πŸ“… 1998 πŸ› Elsevier Science 🌐 English βš– 473 KB

implement information participants to escrow their keys requires the mandatory domestic recovery at their discretion, at with the Government, the use of key escrow or key recovery. a later date, based on their Department of the Treasury is In fact, pending legislation in the respective policies." us