Guarding Your Business

Editors:Sumit Ghosh, Manu Malek, Edward A. Stohr

Paperback ISBN:978-1-4757-8212-7

eBook ISBN:978-0-306-48638-8

Guarding Your Business outlines the organizational elements that must be in place to protect the information and physical assets of typical businesses and organizations. The book recognizes the need for an architecture integrated within the organizational environment for systematic protection. Such an architecture is offered along with the building blocks to make organizations resistant to human error and resilient under physical attack or natural disaster. The book addresses risk assessment, determination of quality-of-service levels that balance safety versus cost, security versus privacy, determination of access rights to data and software, and a security-conscious culture in the organization. Questions answered by experts from academia and industry include: How can one organize for security? What organizational structures, policies, and procedures must be in place? What legal and privacy issues must be addressed?

Business
Management
Manager
architecture
data security
organization
security

  • Front Matter
    Pages i-xiv
  • Background
    Security Principles for Managers
  • Manu Malek
    Pages 1-13
  • The Fundamental Nature of Network Security
    Sumit Ghosh
    Pages 15-31
  • Security Threats to the Organization
    Computer Security: Sophisticated Enemies
    Yalkin Demirkaya
    Pages 33-46
  • Digital Pearl Harbor: A Case Study in Industry Vulnerability to Cyber Attack
    Eric Purchase, French Caldwell
    Pages 47-64
  • Cybercrime and the Law
    Susan W. Brenner
    Pages 65-83
  • Overview of Latest Security Technologies
    Some Security Issues and Concerns in the Financial Services Industry
    Dan Schutzer
    Pages 85-99
  • Security and Insecurity of Wireless Networks
    R. Chandramouli
    Pages 101-117
  • Securing Business’s Front Door
    Lawrence O’Gorman
    Pages 119-149
  • Organizing for Security-Managerial Issues
    Managing Information Security Risks across the Enterprise
    Audrey Dorofee
    Pages 151-172
  • Automatic Security Policy Management in Modern Networks
    S. Raj Rajagopalan
    Pages 173-187
  • The Internal Revenue Service’s Mission Assurance Program
    Len Baptiste
    Pages 189-199
  • Organizing for Security
    Paul Rohmeyer
    Pages 201-238
  • Back Matter

Stevens Institute of Technology, Hoboken
Sumit Ghosh, Manu Malek, Edward A. Stohr

Book Title
Guarding Your Business

Book Subtitle
A Management Approach to Security

Editors
Sumit Ghosh, Manu Malek, Edward A. Stohr

DOI
https://doi.org/10.1007/b105306

Hardcover ISBN
978-0-306-48494-0
Due: 31 March 2004

Softcover ISBN
978-1-4757-8212-7
Published: 28 March 2013

eBook ISBN
978-0-306-48638-8
Published: 30 December 2005

Edition Number
1

Number of Pages
XIV, 252

Number of Illustrations
16 b/w illustrations

Topics
Business Strategy/Leadership, Management of Computing and Information Systems, Electrical Engineering, Social Sciences, general, Systems Theory, Control, Anthropology

WhatsApp