|
Showing 1 - 1 of
1 matches in All Departments
An organization's employees are often more intimate with its
computer system than anyone else. Many also have access to
sensitive information regarding the company and its customers. This
makes employees prime candidates for sabotaging a system if they
become disgruntled or for selling privileged information if they
become greedy. Insider Computer Fraud: An In-depth Framework for
Detecting and Defending against Insider IT Attacks presents the
methods, safeguards, and techniques that help protect an
organization from insider computer fraud. Drawing from the author's
vast experience assessing the adequacy of IT security for the
banking and securities industries, the book presents a practical
framework for identifying, measuring, monitoring, and controlling
the risks associated with insider threats. It not only provides an
analysis of application or system-related risks, it demonstrates
the interrelationships that exist between an application and the IT
infrastructure components it uses to transmit, process, and store
sensitive data. The author also examines the symbiotic relationship
between the risks, controls, threats, and action plans that should
be deployed to enhance the overall information security governance
processes. Increasing the awareness and understanding necessary to
effectively manage the risks and controls associated with an
insider threat, this book is an invaluable resource for those
interested in attaining sound and best practices over the risk
management process.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Holy Fvck
Demi Lovato
CD
R435
Discovery Miles 4 350
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|
Email address subscribed successfully.
A activation email has been sent to you.
Please click the link in that email to activate your subscription.