Chapter 5. IT Security, Crime, Compliance, and Continuity

  • Chapter 5 Link Library

  • Quick Look at Chapter 5

  • Swiss Bank Account Data Stolen from HSBC Private Bank

  • 5.1 Protecting Data and Business Operations

  • 5.2 IS Vulnerabilities and Threats

  • 5.3 Fraud, Crimes, and Violations

  • 5.4 Information Assurance and Risk Management

  • 5.5 Network Security

  • 5.6 Internal Control and Compliance

  • 5.7 Business Continuity and Auditing

  • Business Case: NEC's Weak Internal Controls Contribute to NASDAQ Delisting

  • Public Sector Case: Blue Cross Mistake Releases Data of 12,000 Members

  • Analysis Using Spreadsheets: Estimating Investments in Anti-Spam Protection

  • Case on Student Web Site

  • 5.3 $55 Million Data Breach at ChoicePoint

  • References

Learning Objectives

  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity

Information Security Magazine searchsecurity.techtarget.com/

CIO Magazine, IT Security

Get Information Technology for Management: Improving Strategic and Operational Performance, 8th Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.