Narrow your search
Listing 1 - 10 of 10
Sort by

Book
Social media warfare
Author:
ISBN: 9781138036024 9781315232072 9781351866972 9781351866958 Year: 2017 Publisher: Boca Raton, FL CRC/Taylor & Francis

Loading...
Export citation

Choose an application

Bookmark

Abstract

Social media applications can be weaponized with very little skill. Social media warfare has become a burden that nation states, government agencies, and corporations need to face. To address the social media warfare threat in a reasonable manner that reduces uncertainty requires dedication and attention over a very long-term. To stay secure, they need to develop the capability to defend against social media warfare attacks. Addressing unconventional warfare strategies and tactics takes time and experience, plus planning and dedication. This book will help managers develop a sound understanding of how social media warfare can impact their nation or their organization.

Socially responsible IT management
Author:
ISBN: 1281007064 9786611007065 0080492304 1555582907 9781555582906 9780080492308 9781281007063 Year: 2003 Publisher: Amsterdam ; Burlington, MA : Digital Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Socially Responsible IT Management shows IT professionals how to overcome the social crisis that has resulted from the wide-spread use of information technology. By responsibly managing security threats, protecting individual privacy, reducing hazardous waste, and minimizing other negative effects on IT staff and computer users, as well as ordinary citizens around the world, IT professionals can benefit the society at large and reap rewards for their own organizations as well.Scandals at Enron, Andersen, Sotheby's and Christie's, Merrill Lynch, and Tyco are fueling a crisis of confiden

Physical security for IT
Author:
ISBN: 128101494X 9786611014940 0080495907 155558327X 9781555583279 9780080495903 9781281014948 Year: 2005 Publisher: Amsterdam ; Boston : Elsevier Digital Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an

Implementing homeland security for enterprise IT
Author:
ISBN: 1281072850 9786611072858 0080508502 1555583121 9780080508504 9781281072856 9781555583125 Year: 2004 Publisher: Amsterdam ; Boston : Elsevier, Digital Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organi

Trojans, worms, and spyware : a computer security professional's guide to malicious code
Author:
ISBN: 1281028525 9786611028527 0080519687 1417544473 9781417544479 1592783945 9781592783946 9780080519685 0750678488 9780750678483 9781281028525 6611028528 Year: 2005 Publisher: Amsterdam ; Boston : Elsevier Butterworth Heinemann,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information


Digital
Implementing homeland security for enterprise IT
Author:
ISBN: 9780080508504 0080508502 1281072850 9781281072856 Year: 2004 Publisher: Boston Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland Security after the terrorist attacks of September 2001. The September 11, 2001, attacks illustrated the immense vulnerability to terrorist threats. Since then there have been considerable efforts to develop plans and methods to protect critical infrastructures and key assets. The government at all levels, private sector organizations, as well as concerned citizens have begun to establish partnerships and to develop action plans. But there are many questions yet to be answered about what organizations should actual do to protect their assets and their people while participating in national efforts to improve security. This book provides practical steps that IT managers in all organizations and sectors can take to move security from the planning process into practice. *A one-minute manager approach to issuesp provides background and explanations in all areas *Step-by-step instructions on how to accomplish objectives guide readers through processes *Easy to implement advice allows readers to take quick action.

Physical security for IT
Author:
ISBN: 9781555583279 155558327X 0080495907 9780080495903 128101494X 9781281014948 Year: 2005 Publisher: Boston Elsevier Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

The physical security of IT, network, and telecommunications assets is equally as important as cyber security. We justifiably fear the hacker, the virus writer and the cyber terrorist. But the disgruntled employee, the thief, the vandal, the corporate foe, and yes, the terrorist can easily cripple an organization by doing physical damage to IT assets. In many cases such damage can be far more difficult to recover from than a hack attack or malicious code incident. It does little good to have great computer security if wiring closets are easily accessible or individuals can readily walk into an office and sit down at a computer and gain access to systems and applications. Even though the skill level required to hack systems and write viruses is becoming widespread, the skill required to wield an ax, hammer, or fire hose and do thousands of dollars in damage is even more common. Although many books cover computer security from one perspective or another, they do not thoroughly address physical security. This book shows organizations how to design and implement physical security plans. It provides practical, easy-to-understand and readily usable advice to help organizations to improve physical security for IT, network, and telecommunications assets. * Expert advice on identifying physical security needs * Guidance on how to design and implement security plans to prevent the physical destruction of, or tampering with computers, network equipment, and telecommunications systems * Explanation of the processes for establishing a physical IT security function * Step-by-step instructions on how to accomplish physical security objectives * Illustrations of the major elements of a physical IT security plan * Specific guidance on how to develop and document physical security methods and procedures.

Keywords

Socially responsible IT management
Author:
ISBN: 9781555582906 1555582907 Year: 2003 Publisher: Burlington, MA Digital Press

Loading...
Export citation

Choose an application

Bookmark

Abstract

Socially Responsible IT Management shows IT professionals how to overcome the social crisis that has resulted from the wide-spread use of information technology. By responsibly managing security threats, protecting individual privacy, reducing hazardous waste, and minimizing other negative effects on IT staff and computer users, as well as ordinary citizens around the world, IT professionals can benefit the society at large and reap rewards for their own organizations as well. Scandals at Enron, Andersen, Sotheby's and Christie's, Merrill Lynch, and Tyco are fueling a crisis of confidence in business. Regulators, voters, investors, customers, and employees are demanding that businesses be more socially responsible. Rhetoric is not enough, all organizations need to demonstrate that they are living up to social expectations. Erbschloe shows managers how to take charge of key aspects of their IT operations and follow a morally, ethically, and legally correct path to success. Supported by author speaking tour and "Computer Economics" website, www.computereconomics.com Step-by-step instructions on how to accomplish objectives of privacy and security Explains principles of ergonomics, energy efficiency, and recycling that can bring return on investment.


Book
Threat level red : cybersecurity research programs of the US government
Author:
ISBN: 1351683330 1315167557 1351683322 Year: 2017 Publisher: Boca Raton : Taylor & Francis, CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity."--Provided by publisher.


Book
Walling out the insiders : controlling access to improve organizational security
Author:
ISBN: 1315402645 1315402661 1315402653 Year: 2017 Publisher: Boca Raton : CRC Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 10 of 10
Sort by