IT SECURITY OUTSOURCING: HOW SAFE IS YOUR IT SECURITY?
β Scribed by Colette Fenn; Robert Shooter; Ken Allan
- Publisher
- Elsevier Science
- Year
- 2002
- Tongue
- English
- Weight
- 56 KB
- Volume
- 18
- Category
- Article
- ISSN
- 0267-3649
No coin nor oath required. For personal study only.
β¦ Synopsis
The 'Information Security Survey 2001' (published by Ernst & Young) found that 66% of respondent companies were fearful about inadequate IT security and claimed this was the single biggest inhibitor to the expansion of electronic commerce. Their insecurity would appear fully justified when you consider that 75% of them had experienced critical breaches in their IT security over the past year. This article explores the business case for IT security outsourcing and looks at some of the contractual provisions that can make or break an effective outsourcing arrangement.
π SIMILAR VOLUMES
## Abstract Most companies realize that ITβrelated business risk is substantial. But few rigorously analyze and quantify that risk. So it's tough to justify a given expense for IT security. The authors show how to measure that riskβand decide if your security actions are adequate. __Β© 2004 Wiley Pe
implement information participants to escrow their keys requires the mandatory domestic recovery at their discretion, at with the Government, the use of key escrow or key recovery. a later date, based on their Department of the Treasury is In fact, pending legislation in the respective policies." us