O'Reilly logo

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies by Steven Hernandez, Corey Schou

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 13

Human Resource Assurance

Even though society has evolved and become dependent upon technology, human resources still determine organizational success. It is undeniable that people are often the weakest link in maintaining the information assurance chain.

Within any organization, the people who have direct or indirect interaction with information systems are the internal users, such as office employees, system operators, implementers, administrators, designers, and managers.

There are also external users such as vendors, service providers, business partners, and unregistered users who may have access to the system. There is a wide range of information assurance issues relating to how individuals gain authorization and access to the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required