Managing Information System Security by Gurpreet Dhillon (auth.)

By Gurpreet Dhillon (auth.)

Show description

Read or Download Managing Information System Security PDF

Similar network security books

Hiding in Plain Sight : Steganography and the Art of Covert Communication

* Explains precisely what steganography is-hiding a message inside of an harmless photo or song file-and the way it has develop into a favored instrument for secretly sending and receiving messages for either the great men and the undesirable men * First ebook to explain overseas terrorists' cybersecurity software of selection in an obtainable language * writer is a best safety advisor for the CIA and offers gripping tales that exhibit how steganography works * Appendix presents instruments to assist humans realize and counteract stenanography

Handbook of Risk

The last word resource for threat administration informationBefore stepping into any funding, the chance of that enterprise needs to be pointed out and quantified. The guide of probability presents in-depth assurance of possibility from each attainable perspective and illuminates the topic by way of masking the quantitative and and behavioral matters confronted by means of funding execs on a daily foundation.

Information Security Governance Simplified: From the Boardroom to the Keyboard

Safeguard practitioners has to be capable of construct economical protection courses whereas additionally complying with executive rules. info defense Governance Simplified: From the Boardroom to the Keyboard lays out those rules basically and explains easy methods to use keep an eye on frameworks to construct an air-tight info safeguard (IS) software and governance constitution.

Computer Security Fundamentals

ONE-VOLUME creation TO laptop defense sincerely explains middle ideas, terminology, demanding situations, applied sciences, and abilities Covers today’s newest assaults and countermeasures the proper beginner’s advisor for somebody attracted to a working laptop or computer safety occupation Chuck Easttom brings jointly whole assurance of all simple thoughts, terminology, and concerns, besides the entire talents you must start.

Extra resources for Managing Information System Security

Sample text

At a practical level this could be concerned with choosing A framework for interpreting the management ofIS security 37 the right hardware. The four-fold classification has primarily been established to solve organisational problems. Their underlying assumption is that problems are linked to the communication of information. Since information is integral to organisations, it is important to understand it as a social process. Furthermore , the use of information is seen as a process of manipulating signs.

As Scrivens (1987) notes: The greed of the NHS for information has grown rapidly in the last decade because of increased pressures from the central govemment to increase the accountability of the service in its use of public money, to rationalise its resource allocation procedures and to maximise value for money. Recent changes in the management style of the NHS towards general management have increased further the desire for more information about the mnning of the health care service. The information needs of the NHS are closely related to its concerns about limited resources, increased demand for services and a lack of management in the past (p 147).

Solutions to the problem of security can be provided by interpreting the behavioural patterns of the people involved. Through the help of two case studies, this book shows how such an analysis can be conducted. It also draws out some general principles that would guide practitioners to better manage information system security. The conceptual framework adopted in this chapter considers the management of information system security to be constituted of the following elements of interest: • The business environment of an organisation and its impact on the development and use of computer based information systems.

Download PDF sample

Rated 4.07 of 5 – based on 5 votes