|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910782971703321 |
|
|
Autore |
Lacey David |
|
|
Titolo |
Managing the human factor in information security [[electronic resource] ] : how to win over staff and influence business managers / / David Lacey |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Chichester, West Sussex, England ; ; Hoboken, NJ, : Wiley, c2009 |
|
|
|
|
|
|
|
ISBN |
|
1-282-02245-8 |
9786612022456 |
0-470-74208-9 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (400 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer crimes - Prevention |
Electronic data processing departments - Security measures |
Industries - Security measures |
Information technology - Security measures |
Management information systems - Human factors |
Management - Employee participation |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Managing the Human Factor in Information Security; Contents; Acknowledgements; Foreword; Introduction; 1 Power to the people; 2 Everyone makes a difference; 3 There's no such thing as an isolated incident; 4 Zen and the art of risk management; 5 Who can you trust?; 6 Managing organization culture and politics; 7 Designing effective awareness programs; 8 Transforming organization attitudes and behaviour; 9 Gaining executive board and business buy-in; 10 Designing security systems that work; 11 Harnessing the power of the organization; In conclusion; Bibliography; Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
With the growth in social networking and the potential for larger and larger breaches of sensitive data,it is vital for all enterprises to ensure that computer users adhere to corporate policy and project staff design secure systems. Written by a security expert with more than 25 years' experience, this book examines how fundamental staff awareness is to establishing security and addresses such challenges as containing |
|
|
|
|