Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Series TitleSeries Title
-
Reading LevelReading Level
-
YearFrom:-To:
-
More FiltersMore FiltersContent TypeItem TypeIs Full-Text AvailableSubjectCountry Of PublicationPublisherSourceTarget AudienceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
9,878
result(s) for
"Information technology Security measures."
Sort by:
Auditing cloud computing
The auditor's guide to ensuring correct security and privacy practices in a cloud computing environment Many organizations are reporting or projecting a significant cost savings through the use of cloud computing—utilizing shared computing resources to provide ubiquitous access for organizations and end users. Just as many organizations, however, are expressing concern with security and privacy issues for their organization's data in the \"cloud.\" Auditing Cloud Computing provides necessary guidance to build a proper audit to ensure operational integrity and customer data protection, among other aspects, are addressed for cloud based resources. Provides necessary guidance to ensure auditors address security and privacy aspects that through a proper audit can provide a specified level of assurance for an organization's resources Reveals effective methods for evaluating the security and privacy practices of cloud services A cloud computing reference for auditors and IT security professionals, as well as those preparing for certification credentials, such as Certified Information Systems Auditor (CISA) Timely and practical, Auditing Cloud Computing expertly provides information to assist in preparing for an audit addressing cloud computing security and privacy for both businesses and cloud based service providers.
Governance and Internal Controls for Cutting Edge IT
2013
In Governance and Internal Controls for Cutting Edge IT, Karen Worstell explains strategies and techniques to guide IT managers as they implement cutting edge solutions for their business needs. Based on practical experience and real-life models, she covers key principles and processes for the introduction of new technologies and examines how to establish an appropriate standard of security and control, particularly in the context of the COBIT 5 framework and affiliated standards.This book will enable you to: Optimize your resources by making the most of the potential benefits, and being aware of the potential risks, of your IT provision, Improve your stakeholder relationships by enhancing your service management and delivery through the application of appropriate standards.Apply security and control methods that are suitable for your business. Maximize the opportunities that are presented by compliance legislation and regulations. Manage your data storage, data recovery and data migration, particularly in the context of the Cloud, Ensure business continuity in the face of an incident, and implement strategies to cover the risk of business interruption when using the Cloud.
IT security risk management : perceived IT security risks in the context of cloud computing
This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature review, Q-sorting, expert interviews, and analysis of data collected from 356 organizations. Additionally, the effects of security risks on negative and positive attitudinal evaluations in IT executives' Cloud Computing adoption decisions are examined. The book's second part presents a mathematical risk quantification framework that can be used to support the IT risk management process of Cloud Computing users.
Security
by
Kearney, Paul
in
Business enterprises
,
COM053000 COMPUTERS / Security / General
,
Computer networks
2010,2016
This pocket guide is based on the approach used by BT to protect its own data security – one that draws on the capabilities of both people and technology. The guide will prove invaluable for IT managers, information security officers and business executives.
Once more unto the Breach
In this revised edition ofOnce more unto the breach, Andrea C Simmons uses her extensive experience to provide an important insight into the changing role and responsibilities of the ISM, walking you through a typical ISM's year and highlighting the challenges and pitfalls of an information security programme.
One of the key failures of security change management is that it is perceived as a project instead of a programme , and is therefore mistakenly assumed to have an end.Once more unto the breachexplains why information security is an ongoing process, using the role of project manager on a programme of change to highlight the various incidents and issues that arise on an almost daily basis - and often go unnoticed.
A major challenge for the ISM is achieving all-important buy-in from their colleagues.Once more unto the breachexplains how to express the importance of the tasks you are undertaking in language that executive management will understand. You'll also discover the importance of having a camera with you at all times.
For too long, security has been seen as more of an inhibitor than an enabler. Once more unto the breach is an invaluable resource that will help you improve this perception, and achieve better overall information protection results as a result.
Asset protection through security awareness
\"Supplying a high-level overview of how to protect your company's physical and intangible assets, Asset Protection through Security Awareness explains the best ways to enlist the assistance of your employees as the first line of defense in safeguarding company assets and mitigating security risks. It reviews key topics surrounding computer security--including privacy, access controls, and risk management--to help you fill the gaps that might exist between management and the technicians securing your network systems. Requiring no previous networking or programming experience, the book delivers a practical approach to asset protection. It specifies the roles of managers and employees in creating a company-wide culture of security awareness and provides step-by-step instruction on how to build an effective security awareness team. Each chapter examines a separate security issue and provides a brief overview of how to address that issue. This book includes helpful tools and checklists to help you address: - Visual, digital, and auditory data security - Payment card industry (PCI) compliance, password management, and social engineering - User authentication methods - Computer and network forensics - Physical security and continuity planning - Privacy concerns and privacy-related regulation This concise security management primer facilitates the up-to-date understanding required to protect your digital and physical assets, including customer data, networking equipment, and employee information. Providing you with powerful tools of diplomacy, this text will help you win the support of your employees and empower them to be effective gatekeepers of your company's most valued assets and trade secrets. \"-- Provided by publisher.
Total Information Risk Management
by
Parlikad, Ajith Kumar
,
Woodall, Philip
,
Borek, Alexander
in
Business information services
,
Data protection
,
Database management
2013,2014
How well does your organization manage the risks associated with information quality? Managing information risk is becoming a top priority on the organizational agenda. The increasing sophistication of IT capabilities along with the constantly changing dynamics of global competition are forcing businesses to make use of their information more effectively. Information is becoming a core resource and asset for all organizations; however, it also brings many potential risks to an organization, from strategic, operational, financial, compliance, and environmental to societal. If you continue to struggle to understand and measure how information and its quality affects your business, this book is for you. This reference is in direct response to the new challenges that all managers have to face. Our process helps your organization to understand the \"pain points\" regarding poor data and information quality so you can concentrate on problems that have a high impact on core business objectives. This book provides you with all the fundamental concepts, guidelines and tools to ensure core business information is identified, protected and used effectively, and written in a language that is clear and easy to understand for non-technical managers. Shows how to manage information risk using a holistic approach by examining information from all sourcesOffers varied perspectives of an author team that brings together academics, practitioners and researchers (both technical and managerial) to provide a comprehensive guideProvides real-life case studies with practical insight into the management of information risk and offers a basis for broader discussion among managers and practitioners