Safeguarding Critical E-Documents [[electronic resource] ] : Implementing a Program for Securing Confidential Information Assets |
Autore | Smallwood Robert F. <1959-> |
Pubbl/distr/stampa | New York, : Wiley, 2012 |
Descrizione fisica | 1 online resource (285 p.) |
Disciplina |
005.8
658.472 |
Soggetto topico |
BUSINESS & ECONOMICS / Information Management
Computer security Cyberspace - Security measures Cyberspace -- Security measures Database security Electronic records Computer security - Security measures Cyberspace |
ISBN |
1-119-20490-9
1-280-79277-9 9786613703163 1-118-28687-1 |
Classificazione | BUS083000 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Safeguarding Critical E-Documents; Contents; Foreword; Preface; Acknowledgments; PART I THE PROBLEM AND BASIC TOOLS; CHAPTER 1 The Problem: Securing Confidential Electronic Documents; WikiLeaks: A Wake-Up Call; U.S. Government Attempts to Protect Intellectual Property; Threats Persist across the Pond: U.K. Companies on Guard; Increase in Corporate and Industrial Espionage; Risks of Medical Identity Theft; Why Don't Organizations Safeguard Their Information Assets?; The Blame Game: Where Does Fault Lie When Information Is Leaked?; Consequences of Not Employing E-Document Security; Notes
CHAPTER 2 Information Governance: The Crucial First Step First, Better Policies; Then, Better Technology for Better Enforcement; Defining Information Governance; Accountability Is Key; Why IG Is Good Business; Impact of a Successful IG Program; Critical Factors in an IG Program; Who Should Determine IG Policies?; Notes; PART II Information Platform Risks and Countermeasures; CHAPTER 3 Managing E-Documents and Records; Enterprise Content Management; Document Management Principles; The Goal: Document Lifecycle Security; Electronic Document Management Systems; Records Management Principles Electronic Records Management Notes; CHAPTER 4 Information Governance and Security for E-mail Messages; Employees Regularly Expose Organizations to E-mail Risk; E-mail Policies Should Be Realistic and Technology Agnostic; Is E-mail Encryption the Answer?; Common E-mail Security Mistakes; E-mail Security Myths; E-record Retention: Fundamentally a Legal Issue; Preserve E-mail Integrity and Admissibility with Automatic Archiving; E-mail Archiving Rationale: Compliance, Legal, and Business Reasons; Don't Confuse E-mail Archiving with Backup; No Personal Archiving in the Workplace Are All E-mails Records?Destructive Retention of E-mail; Notes; CHAPTER 5 Information Governance and Security for Instant Messaging; Instant Messaging Security Threats; Stealing Information through Hijacking and Impersonation; Denial-of-Service Attacks Freeze Access; Network Sniffers and Unauthorized Disclosure of Information Assets; Best Practices for Business IM Use; Technology to Monitor IM; Tips for Safer IM; Notes; CHAPTER 6 Information Governance and Security for Social Media; Types of Social Media in Web 2.0; Social Media in the Enterprise Key Ways Social Media Is Different from E-mail and Instant Messaging Biggest Security Threats of Social Media; Legal Risks of Social Media Posts; Tools to Archive Facebook and Twitter; IG Considerations for Social Media; Notes; CHAPTER 7 Information Governance and Security for Mobile Devices; Current Trends in Mobile Computing; Security Risks of Mobile Computing; Securing Mobile Data; IG for Mobile Computing; Building Security into Mobile Applications; Real Threats Are Poorly Understood; Innovation versus Security: Choices and Trade-Offs; Best Practices to Secure Mobile Applications; Notes CHAPTER 8 Information Governance and Security for Cloud Computing Use |
Record Nr. | UNINA-9910141258503321 |
Smallwood Robert F. <1959->
![]() |
||
New York, : Wiley, 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Security in cyberspace : select assessments and policy considerations / / Martin E. Owens and Deborah R. Simpson, editors |
Pubbl/distr/stampa | Hauppauge, New York : , : Nova Science Publishers, , [2012] |
Descrizione fisica | 1 online resource (193 pages) |
Disciplina | 005.8 |
Collana | Internet policies and issues |
Soggetto topico |
Computer networks - Security measures
Cyberspace - Security measures |
ISBN | 1-62257-365-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910148723203321 |
Hauppauge, New York : , : Nova Science Publishers, , [2012] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs |
Pubbl/distr/stampa | Washington, District of Columbia : , : The National Academies Press, , 2017 |
Descrizione fisica | 1 online resource (83 pages) |
Disciplina | 629.4 |
Collana | Forum on Cyber Resilience Workshop Series |
Soggetto topico |
Cyberspace
Cyberspace - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN | 0-309-46289-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910480209503321 |
Washington, District of Columbia : , : The National Academies Press, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs |
Pubbl/distr/stampa | Washington, District of Columbia : , : The National Academies Press, , 2017 |
Descrizione fisica | 1 online resource (83 pages) |
Disciplina | 629.4 |
Collana | Forum on Cyber Resilience Workshop Series |
Soggetto topico |
Cyberspace
Cyberspace - Security measures |
ISBN |
0-309-46291-6
0-309-46289-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Workshop introduction -- Policy considerations : the intersection of public values and private infrastructure -- Technical considerations for secure software updates -- Microsoft's approach to software updates -- Update issues for open-source software -- Cisco's approach to software updates -- Ensuring robust firmware updates -- Updates in the consumer electronics industry -- Software updates in automotive electronic control units -- The NIST perspective on software updates -- Protecting consumers from software update risks -- Discussion -- Afterword. |
Record Nr. | UNINA-9910795588103321 |
Washington, District of Columbia : , : The National Academies Press, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Software update as a mechanism for resilience and security : proceedings of a workshop / / Anne Frances Johnson and Lynette I. Millett, rapporteurs |
Pubbl/distr/stampa | Washington, District of Columbia : , : The National Academies Press, , 2017 |
Descrizione fisica | 1 online resource (83 pages) |
Disciplina | 629.4 |
Collana | Forum on Cyber Resilience Workshop Series |
Soggetto topico |
Cyberspace
Cyberspace - Security measures |
ISBN |
0-309-46291-6
0-309-46289-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Workshop introduction -- Policy considerations : the intersection of public values and private infrastructure -- Technical considerations for secure software updates -- Microsoft's approach to software updates -- Update issues for open-source software -- Cisco's approach to software updates -- Ensuring robust firmware updates -- Updates in the consumer electronics industry -- Software updates in automotive electronic control units -- The NIST perspective on software updates -- Protecting consumers from software update risks -- Discussion -- Afterword. |
Record Nr. | UNINA-9910816082003321 |
Washington, District of Columbia : , : The National Academies Press, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Strategies for resolving the cyber attribution challenge / / Panayotis A. Yannakogeorgos |
Autore | Yannakogeorgos Panayotis A. |
Pubbl/distr/stampa | Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2013] |
Descrizione fisica | 1 online resource (xix, 85 pages) : illustrations |
Collana |
Air Force Research Institute perspectives on cyber power
Air Force Research Institute papers |
Soggetto topico |
Information warfare
Cyberterrorism - Prevention Cyberspace - Security measures Computer security - Government policy - United States Computer crimes - Prevention - Government policy |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- The cyber environment -- American sponsorship of embryonic global norms -- A framework for development, diplomacy, and defense -- Conclusion. |
Record Nr. | UNINA-9910708145403321 |
Yannakogeorgos Panayotis A.
![]() |
||
Maxwell Air Force Base, Alabama : , : Air University Press, Air Force Research Institute, , [2013] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Threat mitigation and detection of cyber warfare and terrorism activities / / Maximiliano E. Korstanje, University of Palermo, Argentina, [editor] |
Autore | Korstanje Maximiliano E. |
Pubbl/distr/stampa | Hershey, Pennsylvania : , : Information Science Reference, and imprint of IGI Global, , [2017] |
Descrizione fisica | 1 online resource (xx, 314 pages) : illustrations (some color), maps |
Disciplina | 363.325 |
Collana | Advances in Library and Information Science (ALIS) Book Series |
Soggetto topico |
Information warfare - Prevention
Cyberspace - Security measures Cyberterrorism - Prevention Computer crimes - Prevention Internet - Political aspects |
Soggetto non controllato |
Big data analysis
Digital protests E-participation Online blogging Online political behavior Parameter tampering Surveillance and control |
ISBN |
9781522519393
9781522519386 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A simple solution to prevent parameter tampering in web applications / Oguzhan Menemencioglu, Ilhami Muharrem Orak -- Cyber security centres for threat detection and mitigation / Marthie Grobler, Pierre Jacobs, Brett van Niekerk -- Methods and tools of big data analysis for terroristic behavior study and threat identification: illegal armed groups during the conflict in Donbas region (east Ukraine) in period 2014-2015 / Yuriy V. Kostyuchenko, Maxim Yuschenko -- Analysis of cyber-attacks against the transportation sector / Brett van Niekerk -- English speaking countries and the culture of fear: understanding technology and terrorism / Maximiliano Emanuel Korstanje -- Trolls just want to have fun: electronic aggression within the context of e-participation and other online political behaviour in the United Kingdom / Shefali Virkar -- The risk, the real, and the impossibility of life: examining the matrix / Maximiliano Emanuel Korstanje -- OSNs as cyberterrorist weapons against the general public / Nicholas Ayres, Leandros Maglaras, Helge Janicke -- The fight for cyber Thoreau: distinguishing virtual disobedience from digital destruction / Matthew D. Crosston -- Twitter use in student protests: the case of South Africa's #FeesMustFall campaign / Trishana Ramluckan, Sayed Enayat Sayed Ally, Brett van Niekerk -- The roots of terror: the lesser evil doctrine under criticism / Maximiliano Emanuel Korstanje. |
Record Nr. | UNINA-9910154926003321 |
Korstanje Maximiliano E.
![]() |
||
Hershey, Pennsylvania : , : Information Science Reference, and imprint of IGI Global, , [2017] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Three discussions of Russian concepts : 1. Russian information weapons; 2. Baltic defenses (Estonia, Latvia, Lithuania) against Russian propaganda; and 3. Russia's development of non-lethal weapons / / author: Timothy Thomas |
Autore | Thomas Timothy L. |
Pubbl/distr/stampa | McLean, VA : , : The MITRE Corporation, , 2020 |
Descrizione fisica | 1 online resource (74 pages) |
Soggetto topico |
Information warfare - Russia (Federation)
Propaganda - Russia (Federation) Cyberspace - Security measures Nonlethal weapons - Russia (Federation) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Three discussions of Russian concepts |
Record Nr. | UNINA-9910715941103321 |
Thomas Timothy L.
![]() |
||
McLean, VA : , : The MITRE Corporation, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Three faces of the cyber dragon : cyber peace activist, spook, attacker / / Timothy L. Thomas |
Autore | Thomas Timothy L. |
Pubbl/distr/stampa | Fort Leavenworth, KS : , : Foreign Military Studies Office, , 2012 |
Descrizione fisica | 1 online resource (263 unnumbered pages) : color illustrations |
Soggetto topico |
Information warfare - China
Cyberspace - Security measures Information warfare |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Three faces of the cyber dragon |
Record Nr. | UNINA-9910709858303321 |
Thomas Timothy L.
![]() |
||
Fort Leavenworth, KS : , : Foreign Military Studies Office, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Various measures : markup before the Committee on Foreign Affairs, House of Representatives, One Hundred Fifteenth Congress, first session on, H. R. 1164, H.R. 1415, H.R. 2712, H.R. 3542, H.R. 3776, H.Res. 336, H.Res. 401, H.Res. 407 and H.Con. Res. 90, November 15, 2017 |
Pubbl/distr/stampa | Washington : , : U.S. Government Publishing Office, , 2017 |
Descrizione fisica | 1 online resource (iv, 210 pages) |
Soggetto topico |
Virus diseases - Law and legislation - United States
Cyberterrorism - Prevention Cyberspace - Security measures Computer security - Government policy - United States Rohingya (Burmese people) |
Soggetto genere / forma | Legislative hearings. |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Various measures |
Record Nr. | UNINA-9910706778503321 |
Washington : , : U.S. Government Publishing Office, , 2017 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|