O'Reilly logo

Writing Information Security Policies by Scott Barman

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Understanding Security Management and Law Enforcement

As I write this, it is being reported that Microsoft was allegedly hacked by overseas intruders. News reports are saying that the hackers supposedly used viruses to plant Trojan Horse programs, hackers were able to download Microsoft’s proprietary source code. There have been other famous intrusions and manhunts for the perpetrators. Unfortunately, with the exception of a few high profile cases, most of the electronic trespassers do not get caught.

Compared to other areas of law enforcement, computer crime and information forensics are in their infancy. Like in the days of the Old West, the police today must face the problems that arise from any new experience. First, there are jurisdictional ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required