O'Reilly logo

Managing Information Security: Studies from real life by Michael Krausz

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

INTRODUCTION

Breaches of information security are not a new phenomenon, but the means of perpetrating such breaches have changed considerably over the years. Leaking information has always been an issue, but the speed and effectiveness with which breaches of information security can occur, and the potential magnitude of harm caused in today’s computer age, are disturbing and, moreover, typically favour the perpetrator, not the victim.

Bearing in mind the dependency of modern companies on their IT systems, it is clear that special care needs to be taken to keep systems safe and secure. This book focuses solely on the aspects of re-establishing safety and security once, despite all measures taken, a breach has occurred. It puts breaches of information ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required