Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
25,817
result(s) for
"Data protection Management."
Sort by:
Data governance for managers : the driver of value stream optimization and a pacemaker for digital transformation
by
Bollweg, Lars Michael, author
in
Data protection Management.
,
Management information systems.
,
Business enterprises Computer networks Management.
2022
Professional data management is the foundation for the successful digital transformation of traditional companies. Unfortunately, many companies fail to implement data governance because they do not fully understand the complexity of the challenge (organizational structure, employee empowerment, change management, etc.) and therefore do not include all aspects in the planning and implementation of their data governance. This book explains the driving role that a responsive data organization can play in a company's digital transformation. Using proven process models, the book takes readers from the basics, through planning and implementation, to regular operations and measuring the success of data governance.
Data Protection for Virtual Data Centers
2010
Essential information on how to protect data in virtual environments! Virtualization is changing the data center architecture and as a result, data protection is is quickly evolving as well. This unique book, written by an industry expert with over eighteen years of data storage/backup experience, shows you how to approach, protect, and manage data in a virtualized environment. You'll get up to speed on data protection problems, explore the data protection technologies available today, see how to adapt to virtualization, and more. The book uses a \"good, better, best\" approach, exploring best practices for backup, high availability, disaster recovery, business continuity, and more. Covers best practices and essential information on protecting data in virtualized enterprise environmentsShows you how to approach, protect, and manage data while also meeting such challenges as return on investment, existing service level agreements (SLAs), and moreHelps system and design architects understand data protection issues and technologies in advance, so they can design systems to meet the challengesExplains how to make absolutely critical services such as file services and e-mail more available without sacrificing protectionOffers best practices and solutions for backup, availability, disaster recovery, and others This is a must-have guide for any Windows server and application administrator who is charged with data recovery and maintaining higher uptimes.
A Smart Contract-Based Dynamic Consent Management System for Personal Data Usage under GDPR
2021
A massive amount of sensitive personal data is being collected and used by scientists, businesses, and governments. This has led to unprecedented threats to privacy rights and the security of personal data. There are few solutions that empower individuals to provide systematic consent agreements on distinct personal information and control who can collect, access, and use their data for specific purposes and periods. Individuals should be able to delegate consent rights, access consent-related information, and withdraw their given consent at any time. We propose a smart-contract-based dynamic consent management system, backed by blockchain technology, targeting personal data usage under the general data protection regulation. Our user-centric dynamic consent management system allows users to control their personal data collection and consent to its usage throughout the data lifecycle. Transaction history and logs are recorded in a blockchain that provides trusted tamper-proof data provenance, accountability, and traceability. A prototype of our system was designed and implemented to demonstrate its feasibility. The acceptability and reliability of the system were assessed by experimental testing and validation processes. We also analyzed the security and privacy of the system and evaluated its performance.
Journal Article
Protecting your privacy in a data-driven world
\"At what point does the sacrifice to our personal information outweigh the public good? If public policymakers had access to our personal and confidential data, they could make more evidence-based, data-informed decisions that could accelerate economic recovery and improve COVID-19 vaccine distribution. However, access to personal data comes at a steep privacy cost for contributors, especially underrepresented groups. Protecting Your Privacy in a Data-Driven World is a practical, nontechnical guide that explains the importance of balancing these competing needs and calls for careful consideration of how data are collected and disseminated by our government and the private sector. Not addressing these concerns can harm the same communities policymakers are trying to protect through data privacy and confidentiality legislation. Claire McKay Bowen is the Lead Data Scientist for Privacy and Data Security at the Urban Institute. Her research focuses on assessing the quality of differentially private data synthesis methods and science communication. In 2021, the Committee of Presidents of Statistical Societies identified her as an emerging leader in statistics for her technical contributions and leadership to statistics and the field of data privacy and confidentiality\"-- Provided by publisher.
Information Security Breaches
2014,2009,2008
If something happens, your company needs to be ready to take prompt and decisive action to resolve the issue. This book tells you the plans and procedures you need to put in place to tackle an information security breach should it occur. In particular, the book gives you clear guidance on how to treat an information security breach in accordance with ISO27001. If a breach occurs, the evidence needs to be secured professionally. You need to know the rules on evidence gathering, and you need to be capable of isolating the suspect laptops right from the start. If you want your company to respond rapidly to an information security breach, you need to make sure that the responsibilities and roles in your company are clearly defined.
Cybersecurity incident response : how to contain, eradicate, and recover from incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support. Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents. The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing ; Detection ; Containment ; Eradication ; Post-incident actions. What you'll learn: Know the sub-categories of the NIST Cybersecurity Framework ; Understand the components of incident response ; Go beyond the incident response plan ; Turn the plan into a program that needs vision, leadership, and culture to make it successful ; Be effective in your role on the incident response team.
The Visible Employee
2006
For business owners, managers, and IT staff interested in learning how to effectively and ethically monitor and influence workplace behavior, this guide is a roadmap to ensuring security without risking employee privacy or trust. The misuse of information systems by wired workerseither through error or by intentis discussed in detail, as are possible results such as leaked or corrupted data, crippled networks, lost productivity, legal problems, or public embarrassment. This analysis of an extensive four-year research project conducted by the authors covers not only a range of security solutions for at-risk organizations but also the perceptions and attitudes of employees toward workplace surveillance.
Security risk management : building an information security risk management program from the ground up
by
Wheeler, Evan
in
Business enterprises
,
Business enterprises -- Security measures
,
Computer networks
2011
The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the trap of telling the business that they need to fix something, but they can't explain why. This book will help you to break free from the so-called \"best practices\" argument by articulating risk exposures in business terms. You will learn techniques for how to perform risk assessments for new IT projects, how to efficiently manage daily risk activities, and how to qualify the current risk level for presentation to executive level management. While other books focus entirely on risk analysis methods, this is the first comprehensive guide for managing security risks. Named a 2011 Best Governance and ISMS Book by InfoSec Reviews Includes case studies to provide hands-on experience using risk assessment tools to calculate the costs and benefits of any security investmentExplores each phase of the risk management lifecycle, focusing on policies and assessment processes that should be used to properly assess and mitigate riskPresents a roadmap for designing and implementing a security risk management program