Chapter 5. IT Security, Crime, Compliance, and Continuity
Chapter 5 Link Library
Quick Look at Chapter 5
Swiss Bank Account Data Stolen from HSBC Private Bank
5.1 Protecting Data and Business Operations
5.2 IS Vulnerabilities and Threats
5.3 Fraud, Crimes, and Violations
5.4 Information Assurance and Risk Management
5.5 Network Security
5.6 Internal Control and Compliance
5.7 Business Continuity and Auditing
Business Case: NEC's Weak Internal Controls Contribute to NASDAQ Delisting
Public Sector Case: Blue Cross Mistake Releases Data of 12,000 Members
Analysis Using Spreadsheets: Estimating Investments in Anti-Spam Protection
Case on Student Web Site
5.3 $55 Million Data Breach at ChoicePoint
References
Learning Objectives
Information Security Magazine searchsecurity.techtarget.com/
CIO Magazine, IT Security
Get Information Technology for Management: Improving Strategic and Operational Performance, 8th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.