Computers, Business, and Security - 1st Edition - ISBN: 9780409900651, 9781483144894

Computers, Business, and Security

1st Edition

The New Role for Security

Authors: James A Schweitzer
eBook ISBN: 9781483144894
Imprint: Butterworth-Heinemann
Published Date: 19th February 1987
Page Count: 166
Sales tax will be calculated at check-out Price includes VAT/GST
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
25% off
25% off
25% off
25% off
25% off
20% off
20% off
24.95
18.71
18.71
18.71
18.71
18.71
19.96
19.96
19.99
14.99
14.99
14.99
14.99
14.99
15.99
15.99
31.95
23.96
23.96
23.96
23.96
23.96
25.56
25.56
Unavailable
Price includes VAT/GST
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Computers, Business, and Security: The New Role for Security addresses the professional security manager's responsibility to protect all business resources, with operating environments and high technology in mind. This book discusses the technological aspects of the total security programs.

Organized into three parts encompassing 10 chapters, this book begins with an overview of how the developing information age is affecting business management, operations, and organization. This text then examines a number of vulnerabilities that arise in the process of using business computing and communications systems. Other chapters consider the integration of electronic information technology into the security function. This book discusses as well the need for the integration of computing technology into the business security staff. The final chapter deals with the structure of the security program and explains the components of the overall security responsibility. This book is a valuable resource for professional business security managers, systems administrators, and software/hardware maintenance specialists.

Table of Contents


Preface

Part I The Computer and Security in the Information Age

Chapter 1 Managing Security in the Information Age

The Five Critical Tasks

Implications for Business Security

Chapter 2 Computers and Security

Risks in Using Computers

Applying Information Security Technology

Defining Preferred Protection Methods

Levels of Protection

Protecting Mental Information

Protecting Written Information

Protecting Electronic Information

The Technology of Attack

Causes of Security Violations

Protection Measures

Summary

Part II The Five Critical Tasks

Chapter 3 Critical Task 1: Integrating Computing into the Security Function

Technical Competence on the Security Staff

Selecting the Right Person

Job Assignments

Electronic Security Tasks

Electronic Information Security Standards

Chapter 4 Critical Task 2: Integrating Technology into the Security Function

Ultrasonics

Sensing Technologies

Video

Control Systems

Biometrics and Smart Cards

Electronic Surveillance and Countermeasures

Radio Wave Interception

System Integration

Chapter 5 Critical Task 3: Adapting the Business Security Management Process to Information Age Requirements

Information Application

Reduction of Overhead, Improvement of Quality, Return on Assets

Making Security Investment Decisions

Security Strategy as a Basis for Choice

Chapter 6 Critical Task 4: Protecting the Business Information Resource

Background

A Beginning

Information Resource Management

Attributes of Quality Information

Implementing Information Resource Management

Security Roles in Information Resource Management

Classification of Information

Setting Policy

Regulations Covering Classification

General Guidelines

Classification References

Chapter 7 Critical Task 5: Establishing Security as an Essential Management Function

The Security Manager as Business Executive

Establishing Leadership among Peers in the Company

The Security Manager and Senior Executive Management

Executive Management Characteristics

Considerations: The Security Manager and Executive Management

Risk Management Concepts: A Framework

Part III Securing Today's Business

Chapter 8 Putting It Together: A Security Program for the Information Age

Program Assumptions and Requirements

The Security Manager as a Business Manager

The Right Security Product

Making Competent Technology Decisions

Demonstrating a Contribution

Security Organization for the Information Age

Principles of Security Organization

Organizational Alternatives

Planning

Setting the Security Organizational Structure

Rules of Thumb for Security Organization

Implementing the Security Program

Getting the Security Message to the People

The Security Coordinator Network

The Security Coordinator's Tasks

Security Coordinator Selection, Training, and Motivation

Chapter 9 Business Security Operations in the Information Age

Leadership

Working Relationships

The Core Functions

Support to Unit or Local Security Activities

Training

The Security Career Path

Unit or Local Responsibilities

Chapter 10 Security Policies and Standards

Policy

Standards or Procedures

Details for Security Standards

Preparing the Standards

Organization of the Standards

An Illustrative Electronic Information Security Standard

Sample Standards

Appendix A A Primer on Computing

Appendix B Sample Information Security Policy

Appendix C Sample Electronic Security Review

Appendix D A Glossary of Technology Terms

References

Index

Details

No. of pages:
166
Language:
English
Copyright:
© Butterworth-Heinemann 1987
Published:
Imprint:
Butterworth-Heinemann
eBook ISBN:
9781483144894

About the Author

James A Schweitzer

Ratings and Reviews