|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910830706103321 |
|
|
Autore |
Brotby W. Krag |
|
|
Titolo |
Information security governance [[electronic resource] ] : a practical development and implementation approach / / Krag Brotby |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Hoboken, N.J., : John Wiley & Sons, c2009 |
|
|
|
|
|
|
|
ISBN |
|
1-118-58551-8 |
1-282-13756-5 |
9786612137563 |
0-470-47601-X |
0-470-47600-1 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (207 p.) |
|
|
|
|
|
|
Collana |
|
Wiley series in systems engineering and management |
|
|
|
|
|
|
Disciplina |
|
658.4 |
658.4/78 |
658.472 |
658.478 |
|
|
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer security - Management |
Information technology - Security measures |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Description based upon print version of record. |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
INFORMATION SECURITY GOVERNANCE; Contents; Acknowledgments; Introduction; 1. Governance Overview-How Do We Do It? What Do We Get Out of It?; 1.1 What Is It?; 1.2 Back to Basics; 1.3 Origins of Governance; 1.4 Governance Definition; 1.5 Information Security Governance; 1.6 Six Outcomes of Effective Security Governance; 1.7 Defining Information, Data, Knowledge; 1.8 Value of Information; 2. Why Governance?; 2.1 Benefits of Good Governance; 2.1.1 Aligning Security with Business Objectives; 2.1.2 Providing the Structure and Framework to Optimize Allocations of Limited Resources |
2.1.3 Providing Assurance that Critical Decisions are Not Based on Faulty Information2.1.4 Ensuring Accountability for Safeguarding Critical Assets; 2.1.5 Increasing Trust of Customers and Stakeholders; 2.1.6 Increasing the Company's Worth; 2.1.7 Reducing Liability for Information Inaccuracy or Lack of Due Care in Protection; 2.1.8 |
|
|
|
|