Chapter 5. IT Security, Crime, Compliance, and Continuity

  • Chapter 5 Link Library

  • Quick Look at Chapter 5

  • Swiss Bank Account Data Stolen from HSBC Private Bank

  • 5.1 Protecting Data and Business Operations

  • 5.2 IS Vulnerabilities and Threats

  • 5.3 Fraud, Crimes, and Violations

  • 5.4 Information Assurance and Risk Management

  • 5.5 Network Security

  • 5.6 Internal Control and Compliance

  • 5.7 Business Continuity and Auditing

  • Business Case: NEC's Weak Internal Controls Contribute to NASDAQ Delisting

  • Public Sector Case: Blue Cross Mistake Releases Data of 12,000 Members

  • Analysis Using Spreadsheets: Estimating Investments in Anti-Spam Protection

  • Case on Student Web Site

  • 5.3 $55 Million Data Breach at ChoicePoint

  • References

Learning Objectives

  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity
  • IT Security, Crime, Compliance, and Continuity

Information Security Magazine searchsecurity.techtarget.com/

CIO Magazine, IT Security

Get Information Technology for Management: Improving Strategic and Operational Performance, 8th Edition now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.