CHAPTER 68
OUTSOURCING AND SECURITY
Kip Boyle, Michael Buglewicz, and Steven Lovaas
68.2.1 Effectiveness versus Efficiency
68.3.1 Why Does Outsourcing Fail?
68.3.2 Universal Nature of Risk
68.3.3 Clarity of Purpose and Intent
68.3.6 International Economics
68.4.2 Controlling Outsourcing Risk
68.4.5 Integrity and Authenticity Controls
68.4.6 Confidentiality and Possession Controls
68.4.7 Making the Best of Outsourcing
68.5 OUTSOURCING SECURITY FUNCTIONS
68.5.1 Who Outsources Security?
68.5.2 Why Do Organizations Outsource Security?
68.5.3 What Are the Risks of Outsourcing Security?
68.5.4 How to Outsource Security Functions
68.5.5 Controlling the Risk of Security Outsourcing
68.1 INTRODUCTION.
The term “outsourcing” has come to identify several distinct concepts, each requiring a different risk management strategy. In this chapter, we examine today's practice of outsourcing and the effects and considerations it has, or should have, on the work of information assurance professionals. ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.